Research Article
A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks
Table 1
The comparisons of the prevention attacks.
| ā | IKDM [11] | TinyPBC [12] | KMTD [13] | Ours |
| Against impersonation attack | Yes | Yes | Yes | Yes | Against replay attack | No | No | Yes | Yes | Against wormhole attack | No | No | No | Yes | Against message manipulation attack | No | No | No | Yes |
|
|