Skip to main content

Table 2 Comparison of storage overhead for three schemes in terms of the number of keys stored in each sensor node

From: Providing perfect forward secrecy for location-aware wireless sensor networks

  AP[5] SECK[2] Our scheme
Prior to deployment l k + m + 1 1
After deployment l + n + 1 k + 2 n + 1