Research Article
A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks
Table 2
The cost comparison of the stored key and method used.
| | IKDM [11] | TinyPBC [12] | KMTD [13] | Ours |
| Stored cost (cluster node) | 1 SK + 2 IDs | N/A | 2 SKs + 1 ID | 1 SK + 2 IDs | Stored cost (sensor node) | 2 SKs + 1 ID | 1 SK + 2 IDs | 2 SKs + 1 ID | 1 SK + 2 IDs | New node algorithm | Yes | Yes | Yes | Yes | Detailed security analysis | No | No | Yes | Yes | Group-based protocol | Yes | No | Yes | Yes | Sensor’s homogeneity | Homogeneity | Homogeneity | Hierarchical | Hierarchical | GPS capability (cluster node) | No | No | No | Yes | Path planning agreements | No | No | No | Yes | Dynamic key management | No | No | Yes | Yes |
|
|
SK: the session key. ID: the identity.
|