Research Article
The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach
Table 1
Contribution of the previous works and our protocol.
| | [8, 9] | [4, 5] | [2, 3] | [13] | [12] | [14] | Our proposed approach |
| Communication Cost | ✓ | | ✓ | | | ✓ | ✓ | Authentication | ✓ | ✓ | ✓ | | ✓ | ✓ | ✓ | Confidential | ✓ | ✓ | | | ✓ | ✓ | ✓ | Availability | | | | ✓ | ✓ | | ✓ | Mobility | | ✓ | | | ✓ | | ✓ | Key exchange management | ✓ | | ✓ | | | | ✓ | Establish trust relationship | | ✓ | | ✓ | ✓ | | ✓ | No central authority | | ✓ | | ✓ | | | ✓ |
|
|