Category | USN/M2M | PKI | Proposed method |
---|---|---|---|
Integrity of data | Limited | Enabled | Enabled |
Reply attack | Limited | Disabled | Disabled |
Verification of quality of data | Disabled | Disabled | Enabled |
Physical attack | Weak | Weak | Strong |
Convenience of implementation | Easy | Difficult | Middle |