Research Article

Design and Simulation of Lightweight Identity Authentication Mechanism in Body Area Network

Table 6

Safety performance of different authentication mechanisms.

Eavesdropping tampering attackReplay attackForward/backward securityNonclonabilityMiddleman attackSimulation attackElastic recovery ability

PUF-BASED
HASH-BASED
ECC-BASED