Skip to main content
. 2014 Nov 6;14(11):21023–21044. doi: 10.3390/s141121023

Table 3.

A comparison of elliptic curve cryptography (ECC)-based SUA-WSN schemes. AKE, authenticated key exchange.

Scheme Computation Security


SR UR+SR+GW AKE Anonymity
Our scheme 2M +2A+1H 6M +3E +6A+6H Proven Proven

Choi et al. [27] 2M +5H 6M +18H Proven using a computer security approach No

Shi and Gong [21] 2M +4H 6M +15H Broken [27] No

Yeh et al. [16] 2M +1P + 2H 8M +2P +9H Broken [30] No

M: scalar-point multiplication; P: map-to-point operation; E: symmetric encryption/decryption; A: MAC generation/verification; H: hash function evaluation.