Research Article

Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks

Table 3

Computation cost analysis of Lee and Kim’s scheme [17] (during sessions).

PhasesNodesOperations
SHA164-bit AES163-bit ECDH
EncryptionDecryptionKey generationKey exchange

Procedure 2 Gateway
( times) Cluster head00