Security and Communication Networks / 2020 / Article / Tab 1

Research Article

An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains

Table 1

Notations used in the protocol.

SymbolsDescription

Length of hash chain
Output length of hash function
The secret that needs to be shared
Secret shares
, Seed of hash chain
Number of secret shares
, Key authentication code
Current time used to synchronize the time of the whole network
Maximum clock difference between the sender and the receiver
The start time of interval
Duration of each time interval
Disclosure delay
Sensor node
, Private key and public key of sensor node, respectively
Base station
, The addresses of sensor node and base station, respectively
, Random nonce

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.