Research Article
A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network
Table 6
WSN protocols comparison chart.
| | AODVSTAT | Intrusion detection | INSENS | AODV | TORA | DSR | ZigBee | SPINS | TinySec | MiniSec | ISA 100.11a | WirelessHART |
| Sequence numbers | X | — | — | X | X | X | X | X | — | X | X | X | Time stamp | X | — | — | X | X | X | X | X | — | | X | X | Timeout | X | — | — | X | — | — | X | X | — | | X | X | S & D identifiers | X | X | X | X | X | X | X | X | X | X | X | X | Ack | X | — | — | X | X | X | X | X | — | | X | X | Identification | X | X | X | — | — | — | X | X | X | X | X | X | Safety Code | — | — | — | — | — | — | — | X | — | X | X | X | Crypto | — | — | X | — | — | — | X | X | X | X | X | X | Redundancy | — | — | — | — | — | — | — | — | — | — | X | X | Monitoring | X | X | X | — | — | — | — | — | — | — | — | — | Atomic broadcast | X | — | — | — | X | X | X | — | — | X | X | X | Time-triggered architecture | — | — | — | — | — | — | — | X | — | — | X | X | Bus guardian | — | — | — | — | — | — | X | X | — | — | X | X | Prioritization | X | — | — | X | X | X | X | — | — | — | X | X | Inhibit messages | — | — | X | — | — | — | — | — | — | — | X | X | Hamming distance | — | — | — | — | — | — | — | — | — | — | — | — | Dynamic Routing | X | — | X | X | X | X | X | — | — | — | X | X | | * | ‡ | $$ |
|
|