Research Article

An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains

Table 8

Comparisons of various broadcast authentication protocols.

ā€‰Our schemeTESLAMultilevel TESLALong-duration TESLAScalable TESLA

StructureSingle-chainSingle-chainMultilevelMultilevelMerkel chain
Without using overlong hash chain
Reinitializable
Backward security
Resistance with chosen plaintext attack
Resistance with DoS attack (sensor node)
Resistance with DoS attack (base station)
Fresh node authentication (by base station)
Fault tolerance

The length of top-level hash chain is unlimited.