Research Article
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains
Algorithm 2
Authentication of fresh nodes with cluster heads.
(1) | for fresh node do | (2) | : | (3) | : | (4) | : computes and compares the fingerprints and | (5) | if the fingerprint is true then | | if the fingerprint is true then | (6) | : , where | (7) | : , where | (8) | else | (9) | : , where | (10) | end if | (11) | else | (12) | if the fingerprint is true then | (13) | : , where | (14) | else | (15) | Authentication failure | (16) | end if | (17) | end if | (18) | end for |
|