Security and Communication Networks / 2019 / Article / Tab 1

Research Article

Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN)

Table 1

Comparing the proposed scheme with other schemes.

Comparison CriteriaProposed scheme[10] [11] [12]

Storage overheadTwo univariate polynomials
A univariate polynomial
Bivariate polynomial
Secret key
3 p-bit keys

Computation overheadPolynomial evaluationPolynomial evaluation
Hash function
Polynomial evaluation
Hash function

Communication overheadLowHighHighHigh

Security against sensor-captured attackProbabilisticDeterministicDeterministicDeterministic

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.