Research Article
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN)
Table 1
Comparing the proposed scheme with other schemes.
| Comparison Criteria | Proposed scheme | [10] | [11] | [12] |
| Storage overhead | Two univariate polynomials (t+h) | A univariate polynomial (R+1) | Bivariate polynomial + Secret key | 3 p-bit keys |
| Computation overhead | Polynomial evaluation | Polynomial evaluation + Encryption/Decryption + Hash function | Polynomial evaluation + Hash function | - |
| Communication overhead | Low | High | High | High |
| Security against sensor-captured attack | Probabilistic | Deterministic | Deterministic | Deterministic |
|
|