|
| Sensors: static/moving | Sensors: known info | Sensors: behavior | Sensors: capabilities | Server/sink |
|
[44] | | | | | One, static, or moving |
[39] | | Shared key with sink | Cluster head and cluster members | | |
[30] | | PK server | | | Set of independent, mutually untrusted servers |
[22] | | Global secret | | | |
[28] | | Own location Server location | Cooperate among themselves | | Untrusted server |
[25] | | | They broadcast fake messages | | |
[52] | | | | | |
[29] | Moving sensors (uniform constant speed) | | | | |
[31] | | Shared key with an “operator” which works through a gateway (or directly if it is close enough) | Leaf nodes and aggregator nodes | | |
[21] | Static ones and moving ones (data mules) | Own location (data mules) | Data mules do not communicate with each other. They move randomly | Greater communication coverage (data mules) | |
[34] | | | | | |
[20] | | Own location, neighbours location, sink location | | | |
[49] | | | Leaf nodes and aggregator nodes | | One |
[53] | Moving | | | | |
[16] | | | | | |
[46] | | | | | One |
[50] | Static | Unique ID | Cluster heads randomly chosen | | |
[35] | | Predistributed shared key with any other node and with the base station | | | |
[54] | Static (same cluster) | | Cluster head and cluster members | | Unconstrained |
[13] | | | | | Privacy-enhanced base station |
[14] | | | They can masquerade their MAC They are synchronized | | One |
[24] | | Cell ID | Cluster head and cluster members | | |
[38] | | Area ID | | | |
[18] | | | | | One real, several fake |
[47] | Static ones and moving ones | | | From low resources to high resources | |
[48] | | | | | |
[26] | | | | | |
[42] | | ID and location | | | One |
[27] | | Shared key with sink | | | Moving |
[45] | | | Cluster heads and cluster members | | |
[15] | Static | | | Limited | Static |
[19] | Static | Unique ID, shared key with sink, key for IBC | | Limited | Static |
[32] | | Unique ID, shared key with user | Synchronized with sink | | Several, untrusted |
[23] | | | | | One but several allowed |
[17] | | Public key of owner and TTP | | | |
[43] | | Shared key with neighbours | | | One |
[36] | | Long-term key shared with the sink | | Vulnerable to tampering | High resource, tamper-resistant |
[33] | | | Synchronized with sink | | One |
[37] | | | | | Unconstrained Secure channel with authentication server |
[40] | | | Leaf nodes and aggregator nodes | | |
[41] | | | Leaf nodes and aggregator nodes | | |
|