“…We compare our proposed work with the existing solutions, in previous studies [12][13][14][15][16][17][18][20][21][22] and Johnny et al, 46 for attacks resilience. We mentioned some of the attacks in the previous subsection, regarding the most well-known attacks such as replay, node capture, man-in-the-middle, impersonation, SQL-injection, which cover parts of the attacks resilient summary in Table 5 shown security features supported by our scheme and other schemes.…”