Research Article
PUF-Based Mutual-Authenticated Key Distribution for Dynamic Sensor Networks
Table 3
Comparisons of different key distribution schemes.
| Property | Ours | AP [10] | Lee and Kim [14] | Erfani et al. [16] | Chatterjee et al. [25] | Li et al. [27] |
| Public key encryption | No | No | Yes | No | Yes | Yes | Key predistribution | No | Yes | No | Yes | No | No | Perfect resilience against node capture | Yes | No | — | No | — | — | PUF-based | Yes | No | No | No | Yes | Yes | Mutual authentication | Yes | No | Yes | Yes | No | Yes | Resistant to modelling attacks | Yes | — | — | — | No | No | Resistant to eavesdropping attacks | Yes | — | — | — | Yes | Yes | Resistant to collusion attacks | Yes | — | — | Yes | — | — |
|
|
—: not applicable.
|