Research Article
Discrete Integrity Assuring Slice-Based Secured Data Aggregation Scheme for Wireless Sensor Network (DIA-SSDAS)
Table 7
Comparison using key quality measures.
| | Confidentiality | Integrity | Integrity verification at intermediate nodes | Data recovery | Dynamic query | Attacks addressed |
| ASAHS [9] | End to end | Collective | N | Y | Y | Eavesdropping attack, collusion attack | RCDA [22] | End to end | Collective | N | Y | Y | Eavesdropping attack, forgery attack | MRCDA [24] | End to end | Collective | Y | N | N | Eavesdropping attack, replay attack, malleability attack, node capturing attack | SASPKE | End to end | Collective | N | N | N | Eavesdropping attack, replay attack, malleability attack, packet forgery | IPHCDA | End to end | Collective | N | N | N | Eavesdropping attack, replay attack | DIA-SSDAS | End to end | Node-wise | N | Y | Y | Eavesdropping attack, node compromising attack, replay attack, malleability attack, selective dropping attack, collusion attack |
|
|