Research Article
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains
Table 2
The variable symbols and the corresponding variable names.
| Symbols | Description |
| | The output length of hash function | | The length of a hash chain | | The length of Mignotte’s sequence | | The computational overhead of a hash function | | The computational overhead of generating a random number | | The computational overhead of mapping a random number to one single bit using Hard Core Predicate | | The computational overhead of generating a secret shadow in SRHC-TD | | The computational overhead of computing in SRHC-TD | | The computational overhead of a left shift operation | | The computational overhead of an XOR operation | | The computational overhead of computing solutions to equations |
|
|