Journal of Sensors / 2016 / Article / Tab 3

Research Article

Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks

Table 3

Computation cost analysis of Lee and Kim’s scheme [17] (during sessions).

SHA164-bit AES163-bit ECDH
EncryptionDecryptionKey generationKey exchange

Procedure 2 Gateway
( times) Cluster head00

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.