Skip to main content

Table 2 Comparison of storage overhead for three schemes in terms of the number of keys stored in each sensor node

From: Providing perfect forward secrecy for location-aware wireless sensor networks

 

AP[5]

SECK[2]

Our scheme

Prior to deployment

l

k + m + 1

1

After deployment

l + n + 1

k + 2

n + 1