Research Article

A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey

Table 5

Computation overhead of security-driven CH election schemes.

Category of security-driven CH election schemesComputation overhead

Pre-distributed key schemesF-LEACH hash operations
SecLEACH hash operations

Random number schemesCommitment-based scheme symmetric key encryptions/decryptions+ O(n) random number generations
Seed-based scheme arithmetic operations+ random number generations
Merkle’s puzzle based scheme symmetric key encryptions/decryptions+ arithmetic operations+ random number generations
Trust-based scheme arithmetic operations+ random number generations

Key chain schemesDong’s scheme hash operations + arithmetic operations
Han’s scheme hash operations+ symmetric key encryptions/decryptions+ arithmetic operations

Cryptographic schemesSymmetric cryptography scheme symmetric key encryptions/decryptions
Discrete logarithm scheme modular exponentiations+ hash operations+ arithmetic operations