Research Article
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains
Table 5
The basic simulation configurations.
| Parameters | Value |
| Elements number | | Subsequences number | 4 | Bucket number per subsequence | | Average load per bucket | 6 | Cells number per bucket | 8 | Counter length | 2 bits | Storage element length | ā=ā14 bits | Hash function | MD5 | Pseudorandom permutation | | Proportional parameter in permutation | A random odd number below |
|
|