Skip to main content

Table 4 Comparative analysis of the stability of the communication method

From: A study on the integrity and authentication of weather observation data using Identity Based Encryption

Category

USN/M2M

PKI

Proposed method

Integrity of data

Limited

Enabled

Enabled

Reply attack

Limited

Disabled

Disabled

Verification of quality of data

Disabled

Disabled

Enabled

Physical attack

Weak

Weak

Strong

Convenience of implementation

Easy

Difficult

Middle