Security Technique | Advantage | Disadvantage |
Data error correcting code to provide redundancy | Based on the Redundant Residue Number System (RRNS). Confidentiality Provide. | Data integrity is not provided when number of errors is more than the detecting capability. |
Erasure coding | Dynamic Integrity Check where each storage node computes and broadcasts and algebraic signature on one data share; one node checks its signature against those by other nodes to detect alterations timely. Data confidentiality, dependability and dynamic integrity achieved simultaneously. | No third party can perform integrity checks. Digital signature is not used. |
Constant data motion method | Move the data from one sensor node to the next so as to make it hard for the cracker to track and catch the data. Very efficient. | High communication and storage overhead; less practical in energy-strained environments. |
Attribute based encryption (ABE) | Perfectly matches the model of Role-Based Access Control (RBAC); effectively implements fine-grained access control. | Access point will be necessary and must use always. |
Physiological signal-based key agreement | Electrocardiogram commonly signal used | It can’t handle the reordering of or presence of additional feature vectors |
Elliptic Curve Cryptography (ECC) | ECC can achieve the same level of security as RSA with smaller key sizes. It provides more security as comparison to other security system. | It is very complex. There is no arbitrary (Digital Signature). Practical implementation is a very big task. Not sufficient to broadcast and multicast. |
Biometric system | Error, fraud, mistake etc. don’t exist in the system. Well secure comparison to other. | It uses only limited place. |