Research Article

A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks

Table 1

The comparisons of the prevention attacks.

ā€‰IKDM [11]TinyPBC [12]KMTD [13]Ours

Against impersonation attackYesYesYesYes
Against replay attackNoNoYesYes
Against wormhole attackNoNoNoYes
Against message manipulation attackNoNoNoYes