Skip to main content
. 2016 Dec 21;16(12):2204. doi: 10.3390/s16122204

Table 8.

Comparison between schemes.

Scheme Implementation Environment Node Coordination Comments
Neighborhood Scheme [12]
  • Simulation using the Glomosim Simulator.

  • Used HP iPAQ 550 PDAs outdoors.

  • Node authentication is performed without coordination with other nodes.

  • Provides protection against attacks to the routing protocol using X509, RSA and a sequence number.

  • Rekeying is a local operation between the nodes that share neighborhood keys with a revoked node.

  • Provides forward and backward security.

  • Does not rely on an online trusted third party.

Hierarchical Key Management Scheme [13] Simulation only
  • Level 1 head coordinates all Level 2 heads in its subgroup.

  • Level 2 head coordinates all ordinary heads in its subgroup.

  • Uses a spanning tree topology in ad hoc networks.

  • Provides the forward and backward security.

  • Latency issues during the authentication process and updating secret keys.

Time-Based Key Management Scheme [15] Simulation only
  • For additional node deployment a centre node coordinates the authentication.

  • The scheme is not suitable for a large sensor network because of key storage requirements.

  • Offers protection against wormhole and sinkhole attack.

  • Provides forward and backward security.

Presented Scheme
  • Waspmote nodes and Gateway, XBee 802.15.4 Pro module with antenna. MC1322x USB ZigBee dongle. Agilent 66321D Mobile DC Source.

  • Waspmote Pro IDE v04 with Pro API v013 software based on Arduino. X-CTU provided by Digi and the Wireshark network analyzer in an outdoor implementation.

  • The Leader node monitors the behaviour of all ordinary nodes in this scheme.

  • It is responsible for the authentication, revocation, and reconfiguration phases of other nodes.

  • Provides protection against attacks to the routing protocol using location based routing.

  • Node addition or revocation is handled by the Leader Node.

  • Rekeying is a local operation between the nodes that share neighborhood keys with a revoked node.

  • Provides forward and backward security.

  • Does not rely on online trusted third party.

  • All message exchanges are acknowledged.