Security Technique



Data error correcting code to provide redundancy

Based on the Redundant Residue Number System (RRNS). Confidentiality Provide.

Data integrity is not provided when number of errors is more than the detecting capability.

Erasure coding

Dynamic Integrity Check where each storage node computes and broadcasts and algebraic signature on one data share; one node checks its signature against those by other nodes to detect alterations timely. Data confidentiality, dependability and dynamic integrity achieved simultaneously.

No third party can perform integrity checks. Digital signature is not used.

Constant data motion method

Move the data from one sensor node to the next so as to make it hard for the cracker to track and catch the data. Very efficient.

High communication and storage overhead; less practical in energy-strained environments.

Attribute based encryption (ABE)

Perfectly matches the model of Role-Based Access Control (RBAC); effectively implements fine-grained access control.

Access point will be necessary and must use always.

Physiological signal-based key agreement

Electrocardiogram commonly signal used

It can’t handle the reordering of or presence of additional feature vectors

Elliptic Curve Cryptography (ECC)

ECC can achieve the same level of security as RSA with smaller key sizes. It provides more security as comparison to other security system.

It is very complex. There is no arbitrary (Digital Signature). Practical implementation is a very big task. Not sufficient to broadcast and multicast.

Biometric system

Error, fraud, mistake etc. don’t exist in the system. Well secure comparison to other.

It uses only limited place.