Research Article

SUBBASE: An Authentication Scheme for Wireless Sensor Networks Based on User Biometrics

Table 1

Summary of previous authentication techniques.

ProtocolsMan in the middle attackGuessing attackInsider attackReplay attackData Integrity providedBiometric
Based
Smart Card Based

Wong [8]InsecureInsecureInsecureInsecureNoNoNo
Das and Ambani [9]InsecureInsecureInsecureInsecureNoNoYes
Khan and Alghathbar [10]InsecureInsecureSecureSecureYesNoYes
Yaun [11]InsecureSecureInsecureSecureNoYesYes
Yoon [12]InsecureSecureInsecureSecureYesYesYes
Debiao [13]InsecureSecureSecureSecureYesYesYes
Kaul [14]InsecureInsecureSecureSecureNoNoYes
SungJin [15]SecureSecureSecureSecureYesNoYes
Althobaiti [16]InsecureSecureSecureSecureYesYesNo
Dongwoo [17]SecureSecureSecureSecureYesYesYes
BAS [18]SecureSecureInsecureSecureYesNoNo