Authors Key Management Scheme Techniques Advantages Disadvantages Remarks
Authors Key Management Scheme Techniques Advantages Disadvantages Remarks
Techniques
Advantages
Disadvantages
Remarks
Tseng [24]
heterogeneous-
Secure
Improving security infrastructure public management scheme, identity confirmation, node of key
N/A
network aided certificate public-key management scheme distribution, symmetric secret key
experiments
Haitao[21]
Cluster based Id-based and Secure, fault N/A key management scheme hierarchical group tolerant, and delay
A MANET is considered for experiments where nodes are assumed to be roaming from one sub group another group to sub
management
rekeying policy
The
is in
Reliable
LQI
in
under
over
WSN scenarios
and
Devaraju and
QoS secure
Better performance
QoS N/A in
delivery energy
consumption and end-to-end delay Sanghavi Cluster based Cryptographi Prevention of Reliability of Experiments
and Tada topology based c method and impersonation [43] secure distribution key network coding approach attacks, eavesdropping, authentication and confidentiality, less communication overhead Deng, Mukharji and Agarwal[ 23] Threshold and Distributed identity based key key management management and authenticatio n Saves
key distribution are made in has not been cluster-based evaluated ad hoc
Distributed key generation and based Authenticatio n is the two important features of identity
besides
the research. Zhu et al. GKMPAN [44] Probabilistic Efficiency, It (with scalability has It is a group key management
revoked problem
partially stateless