Research Article

Blockchain-Assisted Distributed Fog Computing Control Flow Attestation

Table 7

Security comparison.

Security featuresSF1SF2SF3SF4SF5SF6SF7SF8SF9SF10

C-FLAT [4]×××
LO-FAT [5]××××
ATRIUM [6]××××
MGC-FA [7]  = 0×××
MGC-FA [7]  = 1××××××
Liu et al. [9]×××××
BDFCFA

√: the scheme supports features, ×: the scheme does not support features. SF1: Resist impersonation attacks, SF2: resist man-in-the-middle attacks, SF3: resist replay attacks, SF4: two-way authentication, SF5: known session key security, SF6: detect ROP attacks, SF7: detect JOP attacks, SF8: detect branch variable attacks, SF9: detect loop variable attacks, and SF10: detect function pointer attacks.