Research Article

Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks

Table 4

Comparison of the related works.

ProtocolOur schemeCheng and Agrawal [6]Liu and Ning [7]Alcaraz et al. [27]

Security analysisCompletePartial (only captured node attack analysis)Partial (only captured node attack analysis)Yes

Provided mobile serviceYesN/AN/AN/A

Proposed applicationYesN/AYesYes

Time complexity analysisYesN/AN/AN/A

Communication cost analysisYesN/AN/AN/A

Stored cost
(cluster node)
Two session keys, itself ID, base station ID, mobile user ID, and RNDOne session key and two polynomial functionsNot specific (it is dependent on the proposed three schemes; for example, key predistribution scheme overheads = N/A

The time cost of key computation
(cluster node)
As shown in Table 1Not specificNot specific