Research Article
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains
Table 1
Notations used in the protocol.
| Symbols | Description |
| | Length of hash chain | | Output length of hash function | | The secret that needs to be shared | | Secret shares | , | Seed of hash chain | | Number of secret shares | , | Key authentication code | | Current time used to synchronize the time of the whole network | | Maximum clock difference between the sender and the receiver | | The start time of interval | | Duration of each time interval | | Disclosure delay | | Sensor node | , | Private key and public key of sensor node, respectively | | Base station | , | The addresses of sensor node and base station, respectively | , | Random nonce |
|
|