Research Article
Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks
Table 4
Comparison of the related works.
| Protocol | Our scheme | Cheng and Agrawal [6] | Liu and Ning [7] | Alcaraz et al. [27] |
| Security analysis | Complete | Partial (only captured node attack analysis) | Partial (only captured node attack analysis) | Yes |
| Provided mobile service | Yes | N/A | N/A | N/A |
| Proposed application | Yes | N/A | Yes | Yes |
| Time complexity analysis | Yes | N/A | N/A | N/A |
| Communication cost analysis | Yes | N/A | N/A | N/A |
| Stored cost (cluster node) | Two session keys, itself ID, base station ID, mobile user ID, and RND | One session key and two polynomial functions | Not specific (it is dependent on the proposed three schemes; for example, key predistribution scheme overheads = | N/A |
| The time cost of key computation (cluster node) | As shown in Table 1 | | Not specific | Not specific |
|
|