Skip to main content

Table 1 Comparative study of state-of-the-art security approaches in the domain

From: Securing communication by attribute-based authentication in HetNet used for medical applications

Type of network

Objective

Problem raised

Solution proposed

Features

HetNet [8]

To enhance PHY layer security (PLS).

Emphasis on secure downlink transmission.

Massive MIMO deployment significantly increases secrecy performance.

• Spectrum efficiency improves due to densely installed BSs.

• BS having big array of antenna offers huge array gain to its authorized user.

HetNet [9]

To enhance PLS.

Increasing security during transmission in wireless HetNet.

SLS and BLS are two transmission schemes taken within such system to boost PLS by using content properties of cached files.

• Artificial interference incorporated by SLS will resist Eve that may be removed by cache-enabled consumers.

• Without cached file, eves can decode nothing in BLS.

• SLS and BLS are successful in achieving huge security gain as compared to normal transmission.

VANET [25]

To enhance PLS in vehicular network using reconfigurable intelligent surface (RIS).

To examine the average secrecy capacity of the system under consideration

Two vehicular network system models are presented that are RIS-based transmission: one is vehicle-to-vehicle interaction with source using access point and other one is in form of VANET with RIS-based relay installed on building.

• RIS technologies evolved as an essential model for smart radio environments where vast numbers of small, low-cost, and passive components replicate the event signal with an adaptive phase shift deprived of the need for a dedicated energy source.

VANET [26]

To enhance effectiveness of rescues with safety assurance.

Computational latency and communication overhead is minimized.

ABE access control scheme.

• Keeps communication private, avoids collision attacks, and enables fine grained access control.

• Privacy and reliability improved.

VANET [27]

Collaborative transmission in VANET, when straight transmission between origin and target is not likely.

Make data transmission relays secure.

CP-ABE is utilized in proposed protocol as it offers encrypted access control approach.

• Suggested approach guarantees secrecy.

• This approach depends on authentication of signature to guarantee the accuracy of delivered messages.

VANET [28]

Secure billing protocol over ABE in vehicular cloud computing.

Safe communication protocols.

ABE is deployed to ensure access control depending on the services purchased. Hash chain methodology is used to allow a vehicle to buy a service by means of an electronic voucher that it must possess.

• Pseudonym methods are employed to protect identity of vehicles and their required services.

• The suggested approach enables reliable billing attributes with lesser computational overhead for vehicular cloud computing.

MANET [29]

To provide the DoS and intrusion detection system in MANETs that will be based on FSM.

DoS and intrusion issues in MANET.

ID-AODV protocol is suggested based on FSM.

• Detection systems are developed using the FSM principle for both attacks: packet dropping and sequence number’s duplication due to DoS and intrusion attack, respectively.

• ID-AODV’s main technical features include network monitoring system, FSM, and attack detection model.

BSN [30]

To guarantee the security and safety of information fused at the BSN coordinator.

Privacy of information.

KP-ABE is employed to guarantee privacy of information.

• KP-ABE offers easy and safe encryption over CP-ABE because KP-ABE is a lightweight encryption scheme.

IoT [31]

To regulate the access to data.

Data protection in resource-limited systems.

CP-ABE using efficient pre-computation methods.

• The pre-computation method is extended to the CP-ABE encryption scheme that enables to reduce computational costs of encryption.

• Reduce practical challenges in deployment of CP-ABE on resource-limited systems.

Under-water wireless sensor network (UWSN) [32]

Design routing protocol for proficient communication between sensors and sinks in UWSN.

Efficient communication between sensors in UWSN.

RE-PBR protocol for UWSNs is presented.

• RE-PBR takes into account three factors to balance energy usage and effective message delivery namely link quality, depth, and residual energy.