option 4: Key-based security uses secret keys to ensure confidentiality, while keyless security does not use secret keys.