Research Article
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains
Table 3
The consumptions in SRHC-TD and the RHCs.
| | Storage method | The whole chain | The seed |
| RHC [28] | Initialization | Computation | | | Communication | | | Publication and verification and recombination | Computation | | | Communication | | |
| SUHC [29] | Initialization | Computation | | | Communication | | | Publication and verification and recombination | Computation | | | Communication | | |
| SRHC [30] | Initialization | Computation | | | Communication | | | Publication and verification and recombination | Computation | | | Communication | | |
| SRHC-TD | Initialization | Computation | | | Communication | | | Publication and verification and recombination | Computation | | | Communication | | |
|
|