Journal of Computer Networks and Communications / 2014 / Article / Tab 6

Research Article

A Regulation-Based Security Evaluation Method for Data Link in Wireless Sensor Network

Table 6

WSN protocols comparison chart.

AODVSTAT Intrusion detection INSENS AODV TORA DSR ZigBee SPINS TinySec MiniSec ISA 100.11a WirelessHART

Sequence numbers XXXXXXXXX
Time stamp XXXXXXXX
Timeout XXXXXX
S & D identifiers XXXXXXXXXXXX
Ack XXXXXXXX
Identification XXXXXXXXX
Safety Code XXXX
Crypto XXXXXXX
Redundancy XX
Monitoring XXX
Atomic broadcast XXXXXXX
Time-triggered architecture XXX
Bus guardian XXXX
Prioritization XXXXXXX
Inhibit messages XXX
Hamming distance
Dynamic Routing XXXXXXXX
*$$