Research Article

Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN)

Table 1

Comparing the proposed scheme with other schemes.

Comparison CriteriaProposed scheme[10] [11] [12]

Storage overheadTwo univariate polynomials
(t+h)
A univariate polynomial
(R+1)
Bivariate polynomial
+
Secret key
3 p-bit keys

Computation overheadPolynomial evaluationPolynomial evaluation
+
Encryption/Decryption
+
Hash function
Polynomial evaluation
+
Hash function
-

Communication overheadLowHighHighHigh

Security against sensor-captured attackProbabilisticDeterministicDeterministicDeterministic