|
| [16] | [17] | [18] | [19] | [20] | [21] | [22] | [13] | [23] | Proposal |
|
IoTs | Yes | No | No | No | No | No | No | No | No | No |
Cloud network | No | Yes | No | No | No | No | No | No | No | No |
Call to network goes to a web server connected to IP cloud | Yes | No | No | No | No | No | No | No | No | No |
Mobile network | No | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | No |
Spontaneous wireless ad hoc networks | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Create network | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Manages network | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | No |
Create resources | No | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | No |
Share secure data | No | No | No | Yes | Yes | No | Yes | Yes | Yes | No |
Share services and resources | No | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | No |
Offer secure services | No | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | No |
Developed prototype | Yes | Yes | Java (J2ME) with KVM | No | No | No | No | No | No | No |
Real deployment | No | No | Mobile Nokia E65 | No | No | No | No | No | No | No |
Devices with limited resources | Yes | No | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes |
Heterogeneous systems (different devices) | Yes | No | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes |
Communities with low resources | Yes | No | No | No | No | No | No | No | No | No |
Device with unique identity | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Community with unique group identity | Yes | No | No | No | No | No | No | No | No | No |
Simulation | Castalia/OPNET | Castalia | Yes | No | No | No | No | No | No | Castalia |
Neighbor discovery phase | Yes | Yes | No | No | No | No | No | No | No | No |
Neighbor threshold | Yes | Yes | No | No | No | No | No | No | No | No |
Neighbor card list | Yes | Yes | Yes | Yes | Yes | Yes | No | No | No | Yes |
Identity card | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Public-private key pair | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Certificate signed by private key | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
Identity card exchange | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Summary function hash | Yes | Sha-1 | Sha-1 | Yes | Yes | SHA-1 | SHA-1 | SHA-1 | SHA-1 | No |
Local repository of public key certificates and trust values | No | Yes | Yes | No | No | Yes | No | No | No | Yes |
Minimal user interaction (user-friendly application) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Users not experts | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Authentication phase | No | No | No | Yes | Yes | Yes | Yes | Yes | No | Yes |
Preauthentication phase | Yes | No | No | No | No | No | No | No | No | No |
Trust established by a user | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
Trust established automatically | Yes | No | No | No | No | No | Yes | Yes | Yes | Yes |
Preauthentication user decides trust level | Yes | No | No | No | No | No | No | No | No | No |
Trust chain | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Ranges of trust | Yes | No | No | No | No | No | No | No | No | No |
Only two trust levels | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Changing trust values | Yes | No | Yes | No | Yes | Yes | Yes | No | No | No |
Trust modifiable based on behavior | Yes | No | Yes | No | Yes | Yes | Yes | No | No | No |
Can also stop trusting | No | No | No | No | No | Yes | Yes | Yes | No | No |
Public keys obtained through network of trust | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Distributed administration service through trusted network | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Public key infrastructure | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Each node acts as client/server | Yes | Yes | Yes | No | No | Yes | No | Yes | No | No |
Nodes join and leave network at will at any time | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
First node creates and sets up the network | No | No | Yes | No | Yes | No | Yes | Yes | Yes | No |
Internet access to all nodes | Yes | Yes | No | No | Yes | Yes | No | No | No | No |
Share many Internet services | No | Yes | No | No | Yes | No | No | No | No | No |
Collaborate within Intranet/Internet | Yes | Yes | No | No | Yes | Yes | No | No | No | No |
Distributed networks | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Central administration | No | No | No | No | No | No | No | No | No | No |
Independent networks | No | No | No | No | Yes | Yes | Yes | Yes | Yes | Yes |
Self-configured network | No | No | Yes | Yes | Yes | Yes | Yes | No | Yes | Yes |
Trust value based on human relations | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Devices similar behavior to human relationships | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Predistribution key algorithm | No | No | No | Yes | No | No | No | No | No | No |
Symmetric key encryption | No | AES | AES | AES | Yes | AES | Yes | AES | AES | No |
Asymmetric key encryption | No | RSA/ECC | RSA/ECC | Yes | Yes | RSA/ECC | Yes | RSA | RSA/ECC | No |
Cryptography suitable for low-power devices | No | No | No | No | No | Yes | Yes | Yes | Yes | No |
Session key | No | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | No |
Distributed CA (each node CA) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Distributed name service | No | No | No | No | No | Yes | No | No | No | No |
The CA for a node any of the trusted nodes | YES | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Trust relationship can be asymmetric | No | No | No | No | No | Yes | Yes | Yes | No | No |
Trust based on physical proximity (first visual contact) | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
Unique IP address assignment | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
Detect existence of duplicated IP addresses | Yes | No | Yes | Yes | No | Yes | No | Yes | Yes | No |
Addresses obtained dynamically | No | Yes | No | No | No | No | Yes | Yes | Yes | No |
Authenticate using IP addresses | No | No | Yes | No | No | No | No | Yes | Yes | No |
Authentication exchanging keys | No | No | No | Yes | No | Yes | Yes | Yes | Yes | Yes |
Authorization exchanging keys | No | No | No | Yes | No | Yes | Yes | Yes | Yes | No |
Key management | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Initial exchange of data/keys | No | No | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Exchange secret keys to encrypt data | No | No | No | Yes | Yes | Yes | Yes | Yes | Yes | No |
Each node requests services from its trusted nodes | No | No | No | Yes | No | Yes | Yes | No | Yes | No |
Groups work in a collaborative way for the network maintenance | Yes | No | No | No | No | Yes | Yes | Yes | Yes | No |
Just one node is required to be connected to the Internet | Yes | Yes | No | No | Yes | Yes | No | No | No | No |
More than one node can be connected to provide Internet access | Yes | No | No | No | Yes | Yes | No | No | No | No |
Connection shared if one user has Internet connection | Yes | Yes | No | No | Yes | Yes | No | No | No | No |
Access to the WWW if one user has Internet connection | Yes | No | No | No | Yes | Yes | No | No | No | No |
Best nodes carry out communications through the Internet | Yes | No | No | No | Yes | Yes | No | No | No | No |
Services shared using TCP connections | No | No | Yes | No | No | No | No | No | No | No |
TCP/IP protocols | Yes | No | No | No | No | No | No | No | No | No |
Network built using IEEE 802.11b/g | No | No | Yes | No | No | No | No | Yes | Yes | No |
Authentication through Bluetooth or ZigBee | No | No | Yes | Yes | No | No | Yes | Yes | Yes | Yes |
Based on social networks | Yes | No | No | No | No | No | No | No | No | Yes |
Intrusion detection technique | No | No | No | Yes | Yes | No | No | Yes | No | No |
Caching technique to avoid overload of the nodes | No | No | No | No | Yes | No | No | No | No | No |
|