Research Article
SUBBASE: An Authentication Scheme for Wireless Sensor Networks Based on User Biometrics
Table 1
Summary of previous authentication techniques.
| Protocols | Man in the middle attack | Guessing attack | Insider attack | Replay attack | Data Integrity provided | Biometric Based | Smart Card Based |
| Wong [8] | Insecure | Insecure | Insecure | Insecure | No | No | No | Das and Ambani [9] | Insecure | Insecure | Insecure | Insecure | No | No | Yes | Khan and Alghathbar [10] | Insecure | Insecure | Secure | Secure | Yes | No | Yes | Yaun [11] | Insecure | Secure | Insecure | Secure | No | Yes | Yes | Yoon [12] | Insecure | Secure | Insecure | Secure | Yes | Yes | Yes | Debiao [13] | Insecure | Secure | Secure | Secure | Yes | Yes | Yes | Kaul [14] | Insecure | Insecure | Secure | Secure | No | No | Yes | SungJin [15] | Secure | Secure | Secure | Secure | Yes | No | Yes | Althobaiti [16] | Insecure | Secure | Secure | Secure | Yes | Yes | No | Dongwoo [17] | Secure | Secure | Secure | Secure | Yes | Yes | Yes | BAS [18] | Secure | Secure | Insecure | Secure | Yes | No | No |
|
|