Journal of Sensors / 2016 / Article / Tab 1

Research Article

Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks

Table 1

Security comparison of the proposed scheme.

Security attacks or features Chen and Li’sLee and Kim’sThe proposed
scheme [16]scheme [17]scheme

Data encryption using a session key PartiallyPartiallyYes
Session key attacks PartiallyPartiallyYes
Mutual authentication NoNoYes
Node impersonation attacks PartiallyNoYes
MITM attacks PartiallyNoYes
Secrecy of past session keys YesYesYes
Secrecy of future session keys NoNoYes
Replay attacks YesNoYes
Node capture attacks YesNoYes

Yes: the scheme resists the attacks or provides the functionality; No: the scheme does not resist the attacks or provide the functionality. Partially: “Yes” under the condition that the secret parameters stored in have not been exposed to an attacker.

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.