|
| [16] | [17] | [18] | [19] | [20] | [21] | [22] | [13] | [23] | Proposal |
|
| IoTs | Yes | No | No | No | No | No | No | No | No | No |
| Cloud network | No | Yes | No | No | No | No | No | No | No | No |
| Call to network goes to a web server connected to IP cloud | Yes | No | No | No | No | No | No | No | No | No |
| Mobile network | No | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | No |
| Spontaneous wireless ad hoc networks | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Create network | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Manages network | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | No |
| Create resources | No | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | No |
| Share secure data | No | No | No | Yes | Yes | No | Yes | Yes | Yes | No |
| Share services and resources | No | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | No |
| Offer secure services | No | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | No |
| Developed prototype | Yes | Yes | Java (J2ME) with KVM | No | No | No | No | No | No | No |
| Real deployment | No | No | Mobile Nokia E65 | No | No | No | No | No | No | No |
| Devices with limited resources | Yes | No | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes |
| Heterogeneous systems (different devices) | Yes | No | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes |
| Communities with low resources | Yes | No | No | No | No | No | No | No | No | No |
| Device with unique identity | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Community with unique group identity | Yes | No | No | No | No | No | No | No | No | No |
| Simulation | Castalia/OPNET | Castalia | Yes | No | No | No | No | No | No | Castalia |
| Neighbor discovery phase | Yes | Yes | No | No | No | No | No | No | No | No |
| Neighbor threshold | Yes | Yes | No | No | No | No | No | No | No | No |
| Neighbor card list | Yes | Yes | Yes | Yes | Yes | Yes | No | No | No | Yes |
| Identity card | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Public-private key pair | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Certificate signed by private key | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
| Identity card exchange | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Summary function hash | Yes | Sha-1 | Sha-1 | Yes | Yes | SHA-1 | SHA-1 | SHA-1 | SHA-1 | No |
| Local repository of public key certificates and trust values | No | Yes | Yes | No | No | Yes | No | No | No | Yes |
| Minimal user interaction (user-friendly application) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Users not experts | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Authentication phase | No | No | No | Yes | Yes | Yes | Yes | Yes | No | Yes |
| Preauthentication phase | Yes | No | No | No | No | No | No | No | No | No |
| Trust established by a user | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
| Trust established automatically | Yes | No | No | No | No | No | Yes | Yes | Yes | Yes |
| Preauthentication user decides trust level | Yes | No | No | No | No | No | No | No | No | No |
| Trust chain | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Ranges of trust | Yes | No | No | No | No | No | No | No | No | No |
| Only two trust levels | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Changing trust values | Yes | No | Yes | No | Yes | Yes | Yes | No | No | No |
| Trust modifiable based on behavior | Yes | No | Yes | No | Yes | Yes | Yes | No | No | No |
| Can also stop trusting | No | No | No | No | No | Yes | Yes | Yes | No | No |
| Public keys obtained through network of trust | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Distributed administration service through trusted network | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Public key infrastructure | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Each node acts as client/server | Yes | Yes | Yes | No | No | Yes | No | Yes | No | No |
| Nodes join and leave network at will at any time | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
| First node creates and sets up the network | No | No | Yes | No | Yes | No | Yes | Yes | Yes | No |
| Internet access to all nodes | Yes | Yes | No | No | Yes | Yes | No | No | No | No |
| Share many Internet services | No | Yes | No | No | Yes | No | No | No | No | No |
| Collaborate within Intranet/Internet | Yes | Yes | No | No | Yes | Yes | No | No | No | No |
| Distributed networks | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Central administration | No | No | No | No | No | No | No | No | No | No |
| Independent networks | No | No | No | No | Yes | Yes | Yes | Yes | Yes | Yes |
| Self-configured network | No | No | Yes | Yes | Yes | Yes | Yes | No | Yes | Yes |
| Trust value based on human relations | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Devices similar behavior to human relationships | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Predistribution key algorithm | No | No | No | Yes | No | No | No | No | No | No |
| Symmetric key encryption | No | AES | AES | AES | Yes | AES | Yes | AES | AES | No |
| Asymmetric key encryption | No | RSA/ECC | RSA/ECC | Yes | Yes | RSA/ECC | Yes | RSA | RSA/ECC | No |
| Cryptography suitable for low-power devices | No | No | No | No | No | Yes | Yes | Yes | Yes | No |
| Session key | No | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | No |
| Distributed CA (each node CA) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Distributed name service | No | No | No | No | No | Yes | No | No | No | No |
| The CA for a node any of the trusted nodes | YES | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Trust relationship can be asymmetric | No | No | No | No | No | Yes | Yes | Yes | No | No |
| Trust based on physical proximity (first visual contact) | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
| Unique IP address assignment | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
| Detect existence of duplicated IP addresses | Yes | No | Yes | Yes | No | Yes | No | Yes | Yes | No |
| Addresses obtained dynamically | No | Yes | No | No | No | No | Yes | Yes | Yes | No |
| Authenticate using IP addresses | No | No | Yes | No | No | No | No | Yes | Yes | No |
| Authentication exchanging keys | No | No | No | Yes | No | Yes | Yes | Yes | Yes | Yes |
| Authorization exchanging keys | No | No | No | Yes | No | Yes | Yes | Yes | Yes | No |
| Key management | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Initial exchange of data/keys | No | No | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Exchange secret keys to encrypt data | No | No | No | Yes | Yes | Yes | Yes | Yes | Yes | No |
| Each node requests services from its trusted nodes | No | No | No | Yes | No | Yes | Yes | No | Yes | No |
| Groups work in a collaborative way for the network maintenance | Yes | No | No | No | No | Yes | Yes | Yes | Yes | No |
| Just one node is required to be connected to the Internet | Yes | Yes | No | No | Yes | Yes | No | No | No | No |
| More than one node can be connected to provide Internet access | Yes | No | No | No | Yes | Yes | No | No | No | No |
| Connection shared if one user has Internet connection | Yes | Yes | No | No | Yes | Yes | No | No | No | No |
| Access to the WWW if one user has Internet connection | Yes | No | No | No | Yes | Yes | No | No | No | No |
| Best nodes carry out communications through the Internet | Yes | No | No | No | Yes | Yes | No | No | No | No |
| Services shared using TCP connections | No | No | Yes | No | No | No | No | No | No | No |
| TCP/IP protocols | Yes | No | No | No | No | No | No | No | No | No |
| Network built using IEEE 802.11b/g | No | No | Yes | No | No | No | No | Yes | Yes | No |
| Authentication through Bluetooth or ZigBee | No | No | Yes | Yes | No | No | Yes | Yes | Yes | Yes |
| Based on social networks | Yes | No | No | No | No | No | No | No | No | Yes |
| Intrusion detection technique | No | No | No | Yes | Yes | No | No | Yes | No | No |
| Caching technique to avoid overload of the nodes | No | No | No | No | Yes | No | No | No | No | No |
|