Research Article

Cluster-Based Authentication Process in a Smart City

Table 9

Comparison between the proposed cluster-based authentication process and some other similar processes.

Comparison CriteriaContender 1Contender 2Contender 3Contender 4The proposed cluster-based authentication process

1. Applicability in smart city paradigmYesYesYesYesYes
2. Applicability in edge computing paradigmNoNoNoNoYes
3. Applicability in device levelNoYesNoNoNo
4. Use of authentication tokenNoNoNoNoYes
5. Use of one time passwordNoYesNoNoNo
6. Hierarchical key managementNoNoNoYesYes
7. Type of encryptionSymmetric keySymmetric keySymmetric keySymmetric keyPublic key
8. Algorithm detailAES-CBCAES-512AES-512 or AES-128AES-512 or AES-128RSA or Elliptical Curve Cryptography
9. Protection against denial of service (DoS) attackYesNoYesNoYes
10. Resistance to insider attackNoNoYesNoYes
11. Trust evaluation on user activityNoNoNoNoYes
12. Low latency with high availabilityNoNot applicableNoNoYes