Research Article

SUBBASE: An Authentication Scheme for Wireless Sensor Networks Based on User Biometrics

Table 3

Comparison between SUBBASe and existing schemes.

AttacksDebiaoYoon AlthobaitiKaulDongwooSUBBASe

Session key EstablishmentNoNoYesYesYesYes
Message ConfidentialityNoNoYesYesYesYes
Prevent IntegrityYesYesYesNoYesYes
Prevent Replay AttackYesYesYesYesYesYes
Prevent Guessing AttackYesYesYesNoYesYes
Provide Mutual AuthenticationYesYesYesYesYesYes
Avoid Impersonation attackNoNoNoNoYesYes
Avoid Node Compromise AttackNoNoYesNoYesYes
Complicated Hardware NeededYesYesNoYesYesNo
Avoid Insider AttackYesNoYesYesYesNo