| Literature DB >> 35161818 |
Saddam Hussain1, Syed Sajid Ullah2, Mueen Uddin1, Jawaid Iqbal3, Chin-Ling Chen4,5,6.
Abstract
WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial attacks. Since WBANs is a real-world application of the healthcare system, it's vital to ensure that the data acquired by the WBANs sensors is secure and not accessible to unauthorized parties or security hazards. As a result, effective signcryption security solutions are required for the WBANs' success and widespread use. Over the last two decades, researchers have proposed a slew of signcryption security solutions to achieve this goal. The lack of a clear and unified study in terms of signcryption solutions can offer a bird's eye view of WBANs. Based on the most recent signcryption papers, we analyzed WBAN's communication architecture, security requirements, and the primary problems in WBANs to meet the aforementioned objectives. This survey also includes the most up to date signcryption security techniques in WBANs environments. By identifying and comparing all available signcryption techniques in the WBANs sector, the study will aid the academic community in understanding security problems and causes. The goal of this survey is to provide a comparative review of the existing signcryption security solutions and to analyze the previously indicated solution given for WBANs. A multi-criteria decision-making approach is used for a comparative examination of the existing signcryption solutions. Furthermore, the survey also highlights some of the public research issues that researchers must face to develop the security features of WBANs.Entities:
Keywords: healthcare; signcryption; wireless body area networks
Mesh:
Year: 2022 PMID: 35161818 PMCID: PMC8839449 DOI: 10.3390/s22031072
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Communication Layers in the WBANs.
Figure 2Application of WBANs.
Summary of the Related Surveys.
| Authors and Ref. No. | Publication Year | Findings |
|---|---|---|
| Saleem et al. [ | 2009 |
Highlight main security requirements and DDoS concerns Provide a thorough assessment of existing security protocols for WBANs |
| Zhang et al. [ | 2011 |
Investigate probable resource-constrained WBANs attacks Present state-of-the-art communication protocols, cryptographic algorithms, and key management strategies Examine existing solutions’ flaws and probable future research areas in WBANs |
| Aqeel et al. [ | 2013 |
Offer a critical analysis of potential WBANs authentication techniques in the light of IEEE 802.15.6 standard |
| Javadi and Razzaque [ | 2013 |
Examine major security and privacy issues as well as potential threats Discuss an unsolved Quality of Service (QoS) problem in WBANs Outline future directions |
| Saha and Anvekar [ | 2014 |
Present a state-of-the-art of existing WBANs security aspects. Highlights several significant security challenges |
| Pathania and Bilandi [ | 2014 |
Outline of WBANs and related challenges from a security perspective Discuss security attacks and security necessities in WBANs |
| Kang and Adibi [ | 2015 |
Investigate the security features of application and communication protocols Discuss the architecture, vulnerabilities, and attacks, as well as future opportunities of WBANs |
| Mainanwal et al. [ | 2015 |
Summarise the benefits and drawbacks of different security and privacy solutions used in WBANs Outline future directions |
| Usha and Priya [ | 2015 |
Address various types of attacks, prevention strategies, and simulation tools for WBANs |
| Masdari and Ahmadzadeh [ | 2016 |
Conduct a comprehensive review and analysis of the numerous authentication schemes presented in WBANs Discuss the benefits and drawbacks of various authentication techniques Outline future directions |
| Naik and Samundiswary [ | 2016 |
Present an overview of WBANs and WSNs Discuss WBANs security protocols with their advantages and disadvantages |
| Al-Janabi et al. [ | 2017 |
Examine the communication architecture of WBANs, as well as their security and privacy needs, security threats, and important issues. Outline future directions |
| Sawaneh et al. [ | 2017 |
Focuses on building and implementing WBANs in healthcare systems Provide a brief overview of WBAN security and privacy requirements |
| Zou et al. [ | 2017 |
Examine a wide range of secure communication solutions within WBANs and between external entities Emphasizes the importance of primary security requirements for secure transmission at both levels |
| Aman and Shah [ | 2017 |
Conduct a thorough review of significant studies on mobile, ubiquitous, and WBANs, focusing on routing and security challenges |
| Narwal and Mohapatra [ | 2018 |
Provide a comprehensive analysis of several authentication approaches Add a complete analysis of the schemes based on security attacks, security features, and a variety of other factors |
| Usman et al. [ | 2018 |
Investigate Security issues at all WBANs layers Underline future directions |
| Malik et al. [ | 2018 |
Present a broad overview of major security requirements and potential attacks in WBANs at various layers of the OSI model |
| Kompara and Holbl [ | 2018 |
A comprehensive overview of existing key agreement methods is presented, with each method being divided into four categories |
| Morales et al. [ | 2019 |
Aims to provide a holistic security picture of the entire WBANs system |
| Bharathi and Venkateswari [ | 2019 |
Present an overview of WBANs, their applications, and security concerns |
| Nidhya and Karthk [ | 2019 |
Review the security and privacy issues of electronic healthcare record systems in WBANs |
| Joshi and Mahopatra [ | 2019 |
Analyze Authentication protocols design issues in WBANs |
| Chaudhary et al. [ | 2019 |
Explore the security and privacy difficulties with WBANs Describe the type of authentication technique that can be employed at a particular stage. |
| Hussain et al. [ | 2019 |
Provide an overview of WBANs and their properties Compares various authentication techniques, highlighting their advantages, disadvantages, performance evaluation, and robustness against various security attacks Outline future directions |
| Asam et al. [ | 2019 |
Present a thorough assessment of the issues in WBANs from the perspectives of communication and security |
| Karchowdhury and Sen [ | 2019 |
Discuss security requirements and Denial of Service concerns |
| Roy et al. [ | 2020 |
Present a comprehensive analysis on WSNs and WBANs security and privacy challenges Examine the characteristics, architecture, performance measures, and applications of both in-depth, and then conduct a comparison analysis Outline future research direction |
| Sharma and Kang [ | 2020 |
Examine and evaluate WBANs routing, security, energy, and cost-cutting problems |
| Hajar et al. [ | 2021 |
Overview WBANs technology with a special focus on security and privacy concerns and countermeasures Outline future research directions |
| Vignesh and Sivakumar [ | 2021 |
Discuss security and routing issues that WBANs face with a preventative mechanism that is in place. |
| Jabeen et al. [ | 2021 |
Review different security approaches of WBANs Investigate the feasibility of multiple attacks while keeping memory restrictions in mind |
| Narwal and Mahopatra [ | 2021 |
Discuss various security and authentication schemes and solutions Discuss WBANs applications, open research issues, recommendations, and future trends |
| Proposed | 2021 |
Surveys all the WBANs signcryption schemes and compared based on EDAS technique to show the efficiency of each. Furthermore, the study emphasized the security issues that the previously suggested schemes face, as well as future work for WBANs. |
Figure 3Survey Organization.
Figure 4WBANs Security Survey and Schemes from 2010 to 2021.
Figure 5Related Security Surveys in the Domain of WBANs.
Summary of the qualitative comparison of the existing surveys with the proposed survey.
| Authors and Ref. No. | One | Two | Three | Four | Five | Six | Seven | Eight |
|---|---|---|---|---|---|---|---|---|
| Saleem et al. [ |
|
|
|
|
|
|
|
|
| Zhang et al. [ |
|
|
|
|
|
|
|
|
| Aqeel et al. [ |
|
|
|
|
|
|
|
|
| Javadi and Razzaque [ |
|
|
|
|
|
|
|
|
| Saha and Anvekar [ |
|
|
|
|
|
|
|
|
| Pathania and Bilandi [ |
|
|
|
|
|
|
|
|
| Kang and Adibi [ |
|
|
|
|
|
|
|
|
| Mainanwal et al. [ |
|
|
|
|
|
|
|
|
| Usha and Priya [ |
|
|
|
|
|
|
|
|
| Masdari and Ahmadzadeh [ |
|
|
|
|
|
|
|
|
| Naik and Samundiswary [ |
|
|
|
|
|
|
|
|
| Al-Janabi et al. [ |
|
|
|
|
|
|
|
|
| Sawaneh et al. [ |
|
|
|
|
|
|
|
|
| Zou et al. [ |
|
|
|
|
|
|
|
|
| Aman and Shah [ |
|
|
|
|
|
|
|
|
| Narwal and Mohapatra [ |
|
|
|
|
|
|
|
|
| Usman et al. [ |
|
|
|
|
|
|
|
|
| Malik et al. [ |
|
|
|
|
|
|
|
|
| Kompara and Holbl [ |
|
|
|
|
|
|
|
|
| Morales et al. [ |
|
|
|
|
|
|
|
|
| Bharathi and Venkateswari [ |
|
|
|
|
|
|
|
|
| Nidhya and Karthk [ |
|
|
|
|
|
|
|
|
| Joshi and Mahopatra [ |
|
|
|
|
|
|
|
|
| Chaudhary et al. [ |
|
|
|
|
|
|
|
|
| Hussain et al. [ |
|
|
|
|
|
|
|
|
| Asam et al. [ |
|
|
|
|
|
|
|
|
| Karchowdhury and Sen [ |
|
|
|
|
|
|
|
|
| Roy et al. [ |
|
|
|
|
|
|
|
|
| Sharma and Kang [ |
|
|
|
|
|
|
|
|
| Hajar et al. [ |
|
|
|
|
|
|
|
|
| Vignesh and Sivakumar [ |
|
|
|
|
|
|
|
|
| Jabeen et al. [ |
|
|
|
|
|
|
|
|
| Narwal and Mahopatra [ |
|
|
|
|
|
|
|
|
| Proposed |
|
|
|
|
|
|
|
|
One: WBANs Architecture, Two: Signcryption schemes consideration, Three: Limitation and strength of WBANs security solutions, Four: Security Requirements, Five: Performance analysis, Six: Open Research Directions and future suggestion, Seven: Comparison with existing’s Surveys, Eight: WBANs applications, demonstrate a specific area covered, demonstrate a survey lake a specific area.
Figure 6Taxonomy of WBANs Signcryption Schemes.
Figure 7Security Requirements for WBANs.
Limitations of Bilinear Pairing based Signcryption Schemes presented for securing WBANs.
| Authors and Ref. No. | Publication Year | Limitations |
|---|---|---|
| Wang and Liu [ | 2015 |
Fails to address the key escrow issue High computing power consumption and increased nature of communication bandwidth due to bilinear pairing |
| Li and Hong [ | 2016 |
Affected by a partial distribution of private keys Utilize bilinear pairing for security hardness which is a computationally intensive operation |
| Mutaz et al. [ | 2018 |
Affected by a partial distribution of private keys Affected by certificate related issues such as certificate distributions, certificate revocation, and certificate administration Utilize bilinear pairing for security hardness which is a computationally intensive operation |
| Lu et al. [ | 2018 |
The scheme may experience issues with private key distribution and key escrow due to the use of the PKG principle Utilize bilinear pairing for security hardness which is a computationally intensive operation |
| Li et al. [ | 2018 |
Affected by a partial distribution of private keys Utilize bilinear pairing for security hardness which is a computationally intensive operation |
| Prameela and Ponmuthuramalingam [ | 2018 |
Affected by a partial distribution of private keys Use bilinear pairing for security hardness which is a computationally intensive operation |
| Anyembe et al. [ | 2018 |
Affected by a partial distribution of private keys Affected by certificate related issues such as certificate distributions, certificate revocation, and certificate administration Utilize bilinear pairing for security hardness which is a computationally intensive operation |
| Iqbal et al. [ | 2019 |
Affected by a partial distribution of private keys Affected by certificate related issues such as certificate distributions, certificate revocation, and certificate administration Utilize bilinear pairing for security hardness which is a computationally intensive operation |
| Hu et al. [ | 2021 |
Affected from key escrow problem of identity-based cryptography Affected by certificate related issues such as certificate distributions, certificate revocation, and certificate administration Utilize bilinear pairing for security hardness which is a computationally intensive operation |
Limitations of ECC based Signcryption Schemes presented for securing WBANs.
| Authors and Ref. No. | Publication Year | Limitations |
|---|---|---|
| Amin et al. [ | 2014 |
Affected by certificate related issues such as certificate distributions, certificate revocation, and certificate administration Use ECC with a key size of 160 bits which may incur high computing power consumption and increase bandwidth |
| Anyembe et al. [ | 2018 |
Hamper by the requirement of a secure channel for distribution of partial keys from the application provider’s and the controller’s key escrow problem Use ECC with a key size of 160 bits which may incur high computing power consumption and increase bandwidth |
| Gao et al. [ | 2019 |
Hamper by the requirement of a secure channel for the distribution of partial private key Use ECC with a key size of 160 bits which may incur high computing power consumption and increase bandwidth |
Limitations of Hyperelliptic Curve based Signcryption Schemes presented for securing WBANs.
| Authors and Ref. No. | Publication Year | Limitations |
|---|---|---|
| Iqbal et al. [ | 2016 |
Fail to establish a central authority and had issues with certificate distributions, certificate revocation, and certificate administration Unable to provide formal proof in either ROM/Standard Model |
| Insaf et al. [ | 2019 |
Necessitating certificate management in a network with a high number of devices might have an impact Unable to provide formal proof in either ROM/Standard Model |
| Noor et al. [ | 2021 |
The authors made a false claim by claiming the security requirements of confidentiality, forward secrecy, anonymity, and anti-replay attack. Unable to provide formal proof in either ROM/Standard Model/informal |
Figure 8Hardness Algorithm Based Taxonomy of the WBANs Signcryption Scheme.
Computation Time of Costly Mathematical Operations in Milliseconds.
| Descriptions | Operation Time in Milliseconds |
|---|---|
| 5.31 | |
|
| 20.04 |
| 6.38 | |
|
| 2.21 |
|
| 1.105 |
Cryptographic Operations Utilised in the Signcryption Phase.
| Authors and Ref. No. | Signcryption |
|---|---|
| Amin et al. [ |
|
| Wang and Liu [ |
|
| Li and Hong [ |
|
| Jawaid et al. [ |
|
| Mutaz et al. [ |
|
| Lu et al. [ |
|
| Li et al. [ |
|
| Prameela & Ponmuthuramalingam [ |
|
| Omala et al. [ |
|
| Omala et al. [ |
|
| Gao et al. [ |
|
| Ullah et al. [ |
|
| Jawaid et al. [ |
|
| Noor et al. [ |
|
| Hu et al. [ |
|
Computation Time in Milliseconds (Signcryption Phase).
| Authors and Ref. No. | Computation Time during Signcryption Phase |
|---|---|
| Amin et al. [ | 6.63 |
| Wang and Liu [ | 31.73 |
| Li and Hong [ | 10.62 |
| Jawaid et al. [ | 4.42 |
| Mutaz et al. [ | 37.21 |
| Lu et al. [ | 91.21 |
| Li et al. [ | 30.83 |
| Prameela & Ponmuthuramalingam [ | 10.62 |
| Omala et al. [ | 19.14 |
| Omala et al. [ | 6.63 |
| Gao et al. [ | 6.63 |
| Ullah et al. [ | 4.42 |
| Jawaid et al. [ | 37.21 |
| Noor et al. [ | 4.42 |
| Hu et al. [ | 10.62 |
Cryptographic Operations Utilised in the Un-Signcryption Phase.
| Authors and Ref. No. | Unsigncryption |
|---|---|
| Amin et al. [ | 2 |
| Wang and Liu [ | 1 |
| Li and Hong [ | 1 |
| Jawaid et al. [ |
|
| Mutaz et al. [ |
|
| Lu et al. [ |
|
| Li et al. [ |
|
| Prameela & Ponmuthuramalingam [ |
|
| Omala et al. [ |
|
| Omala et al. [ |
|
| Gao et al. [ |
|
| Ullah et al. [ |
|
| Jawaid et al. [ | 1 |
| Noor et al. [ |
|
| Hu et al. [ | 3 |
Figure 9Computation Time of Signcryption and Un-signcryption Phase.
Computation Time in Milliseconds (Un-Signcryption Phase).
| Authors and Ref. No. | Computation Time during Un-Signcryption Phase |
|---|---|
| Amin et al. [ | 4.42 |
| Wang and Liu [ | 25.35 |
| Li and Hong [ | 31.73 |
| Jawaid et al. [ | 3.315 |
| Mutaz et al. [ | 46.46 |
| Lu et al. [ | 125.55 |
| Li et al. [ | 58.15 |
| Prameela & Ponmuthuramalingam [ | 15.93 |
| Omala et al. [ | 66.5 |
| Omala et al. [ | 6.63 |
| Gao et al. [ | 8.84 |
| Ullah et al. [ | 4.42 |
| Jawaid et al. [ | 46.46 |
| Noor et al. [ | 3.315 |
| Hu et al. [ | 70.74 |
Comparative Analysis of WBANs Signcryption Schemes based on Security Hardness.
| Ref. No. | Bilinear Pairing | ECC | HEC |
|---|---|---|---|
| Amin et al. [ |
| ||
| Wang and Liu [ |
| ||
| Li and Hong [ |
| ||
| Jawaid et al. [ |
| ||
| Mutaz et al. [ |
| ||
| Lu et al. [ |
| ||
| Li et al. [ |
| ||
| Prameela & Ponmuthuramalingam [ |
| ||
| Omala et al. [ |
| ||
| Omala et al. [ |
| ||
| Gao et al. [ |
| ||
| Ullah et al. [ |
| ||
| Jawaid et al. [ |
| ||
| Noor et al. [ |
| ||
| Hu et al. [ |
|
Strength based Comparative Analysis of WBANs Signcryption Schemes.
| Ref. No. | ROM | N/A |
|---|---|---|
| Amin et al. [ |
| |
| Wang and Liu [ |
| |
| Li and Hong [ |
| |
| Jawaid et al. [ |
| |
| Mutaz et al. [ |
| |
| Lu et al. [ |
| |
| Li et al. [ |
| |
| Prameela & Ponmuthuramalingam [ |
| |
| Omala et al. [ |
| |
| Omala et al. [ |
| |
| Gao et al. [ |
| |
| Ullah et al. [ |
| |
| Jawaid et al. [ |
| |
| Noor et al. [ |
| |
| Hu et al. [ |
|
Communication Overhead in terms of major operations of the signcryption in presented for WBANs.
| Authors & Ref. No. | Ciphertext Size |
|---|---|
| Amin et al. [ |
|
| Wang and Liu [ |
|
| Li and Hong [ |
|
| Jawaid et al. [ |
|
| Mutaz et al. [ |
|
| Lu et al. [ |
|
| Li et al. [ |
|
| Prameela & Ponmuthuramalingam [ |
|
| Omala et al. [ |
|
| Omala et al. [ |
|
| Gao et al. [ |
|
| Ullah et al. [ |
|
| Jawaid et al. [ |
|
| Noor et al. [ |
|
| Hu et al. [ |
|
Communication Overhead of the Signcryption in Presented for WBANs.
| Authors & Ref. No. | Ciphertext Size |
|---|---|
| Amin et al. [ | 992 |
| Wang and Liu [ | 3584 |
| Li and Hong [ | 3584 |
| Jawaid et al. [ | 752 |
| Mutaz et al. [ | 2560 |
| Lu et al. [ | 8704 |
| Li et al. [ | 3584 |
| Prameela & Ponmuthuramalingam [ | 2560 |
| Omala et al. [ | 2560 |
| Omala et al. [ | 992 |
| Gao et al. [ | 1472 |
| Ullah et al. [ | 672 |
| Jawaid et al. [ | 2560 |
| Noor et al. [ | 672 |
| Hu et al. [ | 5632 |
Figure 10Communication Overhead of all the Signcryption Schemes Presented for WBANs.
Selected Parameters for EDAS.
| Criteria | Non-Beneficial | Beneficial | |||
|---|---|---|---|---|---|
| Probability | 0.2 | 0.2 | 0.2 | 0.2 | 0.2 |
| Authors and Ref. No. | Computation Time | Communication Overhead | Security Strength | Security Hardness | Security Requirements |
| Amin et al. [ | 11.05 | 992 | 0 | 0.5 | 0 |
| Wang and Liu [ | 57.08 | 3584 | 0 | 0 | 0.5 |
| Li and Hong [ | 42.35 | 3584 | 0 | 0 | 0 |
| Jawaid et al. [ | 7.735 | 752 | 0 | 1 | 0 |
| Mutaz et al. [ | 83.67 | 2560 | 1 | 0 | 1 |
| Lu et al. [ | 216.76 | 8704 | 1 | 0 | 1 |
| Li et al. [ | 88.98 | 3584 | 1 | 0 | 1 |
| Prameela & Ponmuthuramalingam [ | 26.55 | 2560 | 1 | 0 | 1 |
| Omala et al. [ | 85.64 | 2560 | 1 | 0 | 1 |
| Omala et al. [ | 13.26 | 992 | 1 | 0.5 | 1 |
| Gao et al. [ | 15.47 | 1472 | 1 | 0.5 | 1 |
| Ullah et al. [ | 8.84 | 672 | 0 | 1 | 0 |
| Jawaid et al. [ | 83.67 | 2560 | 1 | 0 | 1 |
| Noor et al. [ | 7.735 | 672 | 0 | 1 | 0 |
| Hu et al. [ | 86.67 | 5632 | 1 | 0 | 1 |
Selected Parameters Average.
| Authors and Ref. No. | Computation Time | Communication Overhead | Security Strength | Security Hardness | Security Requirements |
|---|---|---|---|---|---|
| Amin et al. [ | 11.05 | 992 | 0 | 0.5 | 0 |
| Wang and Liu [ | 57.08 | 3584 | 0 | 0 | 0.5 |
| Li and Hong [ | 42.35 | 3584 | 0 | 0 | 0 |
| Jawaid et al. [ | 7.735 | 752 | 0 | 1 | 0 |
| Mutaz et al. [ | 83.67 | 2560 | 1 | 0 | 1 |
| Lu et al. [ | 216.76 | 8704 | 1 | 0 | 1 |
| Li et al. [ | 88.98 | 3584 | 1 | 0 | 1 |
| Prameela & Ponmuthuramalingam [ | 26.55 | 2560 | 1 | 0 | 1 |
| Omala et al. [ | 85.64 | 2560 | 1 | 0 | 1 |
| Omala et al. [ | 13.26 | 992 | 1 | 0.5 | 1 |
| Gao et al. [ | 15.47 | 1472 | 1 | 0.5 | 1 |
| Ullah et al. [ | 8.84 | 672 | 0 | 1 | 0 |
| Jawaid et al. [ | 83.67 | 2560 | 1 | 0 | 1 |
| Noor et al. [ | 7.735 | 672 | 0 | 1 | 0 |
| Hu et al. [ | 86.67 | 5632 | 1 | 0 | 1 |
| Average | 55.69733333 | 2725.333333 | 0.6 | 0.3 | 0.633333333 |
Positive Distance from Average.
| Authors and Ref. No. | Computation Time | Communication Overhead | Security Strength | Security Hardness | Security Requirements |
|---|---|---|---|---|---|
| Amin et al. [ | 0.801606301 | 0.636007828 | 0 | 0.666666667 | 0 |
| Wang and Liu [ | 0 | 0 | 0 | 0 | 0 |
| Li and Hong [ | 0.239640438 | 0 | 0 | 0 | 0 |
| Jawaid et al. [ | 0.86112441 | 0.72407045 | 0 | 2.333333333 | 0 |
| Mutaz et al. [ | 0 | 0.060665362 | 0.666666667 | 0 | 0.578947369 |
| Lu et al. [ | 0 | 0 | 0.666666667 | 0 | 0.578947369 |
| Li et al. [ | 0 | 0 | 0.666666667 | 0 | 0.578947369 |
| Prameela & Ponmuthuramalingam [ | 0.523316496 | 0.060665362 | 0.666666667 | 0 | 0.578947369 |
| Omala et al. [ | 0 | 0.060665362 | 0.666666667 | 0 | 0.578947369 |
| Omala et al. [ | 0.761927561 | 0.636007828 | 0.666666667 | 0.666666667 | 0.578947369 |
| Gao et al. [ | 0.722248821 | 0.459882583 | 0.666666667 | 0.666666667 | 0.578947369 |
| Ullah et al. [ | 0.841285041 | 0.753424658 | 0 | 2.333333333 | 0 |
| Jawaid et al. [ | 0 | 0.060665362 | 0.666666667 | 0 | 0.578947369 |
| Noor et al. [ | 0.86112441 | 0.753424658 | 0 | 2.333333333 | 0 |
| Hu et al. [ | 0 | 0 | 0.666666667 | 0 | 0.578947369 |
Negative Distance from Average.
| Authors & Ref. No. | Computation Time | Communication Overhead | Security Strength | Security Hardness | Security Requirements |
|---|---|---|---|---|---|
| Amin et al. [ | 0 | 0 | 1 | 0 | 1 |
| Wang and Liu [ | 0.024824448 | 0.315068493 | 1 | 1 | 1 |
| Li and Hong [ | 0 | 0.315068493 | 1 | 1 | 1 |
| Jawaid et al. [ | 0 | 0 | 1 | 0 | 1 |
| Mutaz et al. [ | 0.502226119 | 0 | 0 | 1 | 1 |
| Lu et al. [ | 2.891748059 | 2.193737769 | 0 | 1 | 1 |
| Li et al. [ | 0.59756282 | 0.315068493 | 0 | 1 | 1 |
| Prameela & Ponmuthuramalingam [ | 0 | 0 | 0 | 1 | 1 |
| Omala et al. [ | 0.537595855 | 0 | 0 | 1 | 1 |
| Omala et al. [ | 0 | 0 | 0 | 0 | 1 |
| Gao et al. [ | 0 | 0 | 0 | 0 | 1 |
| Ullah et al. [ | 0 | 0 | 1 | 0 | 1 |
| Jawaid et al. [ | 0.502226119 | 0 | 0 | 1 | 1 |
| Noor et al. [ | 0 | 0 | 1 | 0 | 1 |
| Hu et al. [ | 0.556088662 | 1.066536204 | 0 | 1 | 1 |
Weighted Sum of PDA.
| Authors & Ref. No. | Computation Time | Communication Overhead | Security Strength | Security Hardness | Security Requirements |
|
|---|---|---|---|---|---|---|
| Amin et al. [ | 0.1603213 | 0.12720157 | 0 | 0.13333333 | 0 | 0.42085616 |
| Wang and Liu [ | 0 | 0 | 0 | 0 | 0 | 0 |
| Li and Hong [ | 0.0479281 | 0 | 0 | 0 | 0 | 0.04792809 |
| Jawaid et al. [ | 0.1722249 | 0.14481409 | 0 | 0.46666667 | 0 | 0.78370564 |
| Mutaz et al. [ | 0 | 0.01213307 | 0.133333 | 0 | 0.115789 | 0.26125588 |
| Lu et al. [ | 0 | 0 | 0.133333 | 0 | 0.115789 | 0.24912281 |
| Li et al. [ | 0 | 0 | 0.133333 | 0 | 0.115789 | 0.24912281 |
| Prameela & Ponmuthuramalingam [ | 0.1046633 | 0.01213307 | 0.133333 | 0 | 0.115789 | 0.36591918 |
| Omala et al. [ | 0 | 0.01213307 | 0.133333 | 0 | 0.115789 | 0.26125588 |
| Omala et al. [ | 0.1523855 | 0.12720157 | 0.133333 | 0.13333333 | 0.115789 | 0.66204322 |
| Gao et al. [ | 0.1444498 | 0.09197652 | 0.133333 | 0.13333333 | 0.115789 | 0.61888242 |
| Ullah et al. [ | 0.168257 | 0.15068493 | 0 | 0.46666667 | 0 | 0.78560861 |
| Jawaid et al. [ | 0 | 0.01213307 | 0.133333 | 0 | 0.115789 | 0.26125588 |
| Noor et al. [ | 0.1722249 | 0.15068493 | 0 | 0.46666667 | 0 | 0.78957648 |
| Hu et al. [ | 0 | 0 | 0.133333 | 0 | 0.115789 | 0.24912281 |
Weighted Sum of NDA.
| Authors & Ref. No. | Computation Time | Communication Overhead | Security Strength | Security Hardness | Security Requirements |
|
|---|---|---|---|---|---|---|
| Amin et al. [ | 0 | 0 | 0.2 | 0 | 0.2 | 0.4 |
| Wang and Liu [ | 0.0049649 | 0.0630137 | 0.2 | 0.2 | 0.2 | 0.66797859 |
| Li and Hong [ | 0 | 0.0630137 | 0.2 | 0.2 | 0.2 | 0.6630137 |
| Jawaid et al. [ | 0 | 0 | 0.2 | 0 | 0.2 | 0.4 |
| Mutaz et al. [ | 0.1004452 | 0 | 0 | 0.2 | 0.2 | 0.50044522 |
| Lu et al. [ | 0.5783496 | 0.43874755 | 0 | 0.2 | 0.2 | 1.41709717 |
| Li et al. [ | 0.1195126 | 0.0630137 | 0 | 0.2 | 0.2 | 0.58252626 |
| Prameela & Ponmuthuramalingam [ | 0 | 0 | 0 | 0.2 | 0.2 | 0.4 |
| Omala et al. [ | 0.1075192 | 0 | 0 | 0.2 | 0.2 | 0.50751917 |
| Omala et al. [ | 0 | 0 | 0 | 0 | 0.2 | 0.2 |
| Gao et al. [ | 0 | 0 | 0 | 0 | 0.2 | 0.2 |
| Ullah et al. [ | 0 | 0 | 0.2 | 0 | 0.2 | 0.4 |
| Jawaid et al. [ | 0.1004452 | 0 | 0 | 0.2 | 0.2 | 0.50044522 |
| Noor et al. [ | 0 | 0 | 0.2 | 0 | 0.2 | 0.4 |
| Hu et al. [ | 0.1112177 | 0.21330724 | 0 | 0.2 | 0.2 | 0.72452497 |
Final Ranking based on the chosen Parameters.
| Authors & Ref. No. |
|
|
|
|
| Rank |
|---|---|---|---|---|---|---|
| Amin et al. [ | 0.420856159 | 0.4 | 0.533015065 | 0.717732835 | 0.62537395 | 6 |
| Wang and Liu [ | 0 | 0.667978588 | 0 | 0.528628944 | 0.264314472 | 14 |
| Li and Hong [ | 0.047928088 | 0.663013699 | 0.060701007 | 0.532132507 | 0.296416757 | 13 |
| Jawaid et al. [ | 0.783705639 | 0.4 | 0.992564569 | 0.717732835 | 0.855148702 | 3 |
| Mutaz et al. [ | 0.26125588 | 0.500445224 | 0.330881031 | 0.646851863 | 0.488866447 | 9 |
| Lu et al. [ | 0.249122807 | 1.417097166 | 0.315514473 | 1.866828710 | 0.157757237 | 15 |
| Li et al. [ | 0.249122807 | 0.582526263 | 0.315514473 | 0.588929908 | 0.452222191 | 11 |
| Prameela & Ponmuthuramalingam [ | 0.365919179 | 0.4 | 0.463437283 | 0.717732835 | 0.590585059 | 7 |
| Omala et al. [ | 0.26125588 | 0.507519171 | 0.330881031 | 0.641860006 | 0.486370518 | 10 |
| Omala et al. [ | 0.662043218 | 0.2 | 0.8384789 | 0.858866417 | 0.848672659 | 4 |
| Gao et al. [ | 0.618882421 | 0.2 | 0.783815675 | 0.858866417 | 0.821341046 | 5 |
| Ullah et al. [ | 0.785608606 | 0.4 | 0.994974681 | 0.717732835 | 0.856353758 | 2 |
| Jawaid et al. [ | 0.26125588 | 0.500445224 | 0.330881031 | 0.646851863 | 0.488866447 | 8 |
| Noor et al. [ | 0.78957648 | 0.4 | 1 | 0.717732835 | 0.858866418 | 1 |
| Hu et al. [ | 0.249122807 | 0.724524973 | 0.315514473 | 0.488725974 | 0.402120224 | 12 |