Research Article

Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks

Table 1

Security comparison of the proposed scheme.

Security attacks or features Chen and Li’sLee and Kim’sThe proposed
scheme [16]scheme [17]scheme

Data encryption using a session key PartiallyPartiallyYes
Session key attacks PartiallyPartiallyYes
Mutual authentication NoNoYes
Node impersonation attacks PartiallyNoYes
MITM attacks PartiallyNoYes
Secrecy of past session keys YesYesYes
Secrecy of future session keys NoNoYes
Replay attacks YesNoYes
Node capture attacks YesNoYes

Yes: the scheme resists the attacks or provides the functionality; No: the scheme does not resist the attacks or provide the functionality. Partially: “Yes” under the condition that the secret parameters stored in have not been exposed to an attacker.