Research Article
A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey
Table 5
Computation overhead of security-driven CH election schemes.
| Category of security-driven CH election schemes | Computation overhead |
| Pre-distributed key schemes | F-LEACH | hash operations | SecLEACH | hash operations |
| Random number schemes | Commitment-based scheme | symmetric key encryptions/decryptions+ O(n) random number generations | Seed-based scheme | arithmetic operations+ random number generations | Merkle’s puzzle based scheme | symmetric key encryptions/decryptions+ arithmetic operations+ random number generations | Trust-based scheme | arithmetic operations+ random number generations |
| Key chain schemes | Dong’s scheme | hash operations + arithmetic operations | Han’s scheme | hash operations+ symmetric key encryptions/decryptions+ arithmetic operations |
| Cryptographic schemes | Symmetric cryptography scheme | symmetric key encryptions/decryptions | Discrete logarithm scheme | modular exponentiations+ hash operations+ arithmetic operations |
|
|