Research Article
SUBBASE: An Authentication Scheme for Wireless Sensor Networks Based on User Biometrics
Table 3
Comparison between SUBBASe and existing schemes.
| Attacks | Debiao | Yoon | Althobaiti | Kaul | Dongwoo | SUBBASe |
| Session key Establishment | No | No | Yes | Yes | Yes | Yes | Message Confidentiality | No | No | Yes | Yes | Yes | Yes | Prevent Integrity | Yes | Yes | Yes | No | Yes | Yes | Prevent Replay Attack | Yes | Yes | Yes | Yes | Yes | Yes | Prevent Guessing Attack | Yes | Yes | Yes | No | Yes | Yes | Provide Mutual Authentication | Yes | Yes | Yes | Yes | Yes | Yes | Avoid Impersonation attack | No | No | No | No | Yes | Yes | Avoid Node Compromise Attack | No | No | Yes | No | Yes | Yes | Complicated Hardware Needed | Yes | Yes | No | Yes | Yes | No | Avoid Insider Attack | Yes | No | Yes | Yes | Yes | No |
|
|