Skip to main content
. 2020 Dec 28;8(21):15694–15703. doi: 10.1109/JIOT.2020.3047662

TABLE II. Comparison of MASK Protocol Versus Conventional Protocols.

Inline graphic [10] [16] [18] [21] [22] [23] [24] [25] Inline graphic
Inline graphic
Inline graphic
Inline graphic
Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Inline graphic Inline graphic Inline graphic Inline graphic
Inline graphic Inline graphic Inline graphic
Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Inline graphic
Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Inline graphic Inline graphic Inline graphic
Inline graphic
Inline graphic Inline graphic
Inline graphic Inline graphic Inline graphic
Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Inline graphic Inline graphic Inline graphic Inline graphic
Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic

Acronyms: Inline graphic: Security goals, Inline graphic: MASK protocol, ✔: Secure against attack/preserves a security attribute, Inline graphic: Vulnerable/non accomplishment of security attribute, Inline graphic: Not applicable, Inline graphic: Replay, Inline graphic: Impersonation, Inline graphic: Modification of messages, Inline graphic: DoS, Inline graphic: MITM, Inline graphic: Known key, Inline graphic: Cloning, Inline graphic: Side-channel, Inline graphic: Mutual authentication, Inline graphic: Data privacy, Inline graphic: Session key security, Inline graphic: Message integrity, Inline graphic: Message freshness, Inline graphic: User identity anonymity, Inline graphic: Sensor node identity anonymity, Inline graphic: User untraceability, Inline graphic: Sensor node untraceability