Research Article
Cluster-Based Authentication Process in a Smart City
Table 9
Comparison between the proposed cluster-based authentication process and some other similar processes.
| Comparison Criteria | Contender 1 | Contender 2 | Contender 3 | Contender 4 | The proposed cluster-based authentication process |
| 1. Applicability in smart city paradigm | Yes | Yes | Yes | Yes | Yes | 2. Applicability in edge computing paradigm | No | No | No | No | Yes | 3. Applicability in device level | No | Yes | No | No | No | 4. Use of authentication token | No | No | No | No | Yes | 5. Use of one time password | No | Yes | No | No | No | 6. Hierarchical key management | No | No | No | Yes | Yes | 7. Type of encryption | Symmetric key | Symmetric key | Symmetric key | Symmetric key | Public key | 8. Algorithm detail | AES-CBC | AES-512 | AES-512 or AES-128 | AES-512 or AES-128 | RSA or Elliptical Curve Cryptography | 9. Protection against denial of service (DoS) attack | Yes | No | Yes | No | Yes | 10. Resistance to insider attack | No | No | Yes | No | Yes | 11. Trust evaluation on user activity | No | No | No | No | Yes | 12. Low latency with high availability | No | Not applicable | No | No | Yes |
|
|