Research Article
Design and Simulation of Lightweight Identity Authentication Mechanism in Body Area Network
Table 6
Safety performance of different authentication mechanisms.
| | Eavesdropping tampering attack | Replay attack | Forward/backward security | Nonclonability | Middleman attack | Simulation attack | Elastic recovery ability |
| PUF-BASED | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | — | HASH-BASED | ✓ | ✓ | ✓ | — | ✓ | ✓ | ✓ | ECC-BASED | ✓ | ✓ | — | — | ✓ | — | ✓ |
|
|