Research Article

An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains

Table 3

The consumptions in SRHC-TD and the RHCs.

Storage methodThe whole chainThe seed

RHC [28]InitializationComputation
Communication
Publication and verification and recombinationComputation
Communication

SUHC [29]InitializationComputation
Communication
Publication and verification and recombinationComputation
Communication

SRHC [30]InitializationComputation
Communication
Publication and verification and recombinationComputation
Communication

SRHC-TDInitializationComputation
Communication
Publication and verification and recombinationComputation
Communication