Research Article
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains
Table 8
Comparisons of various broadcast authentication protocols.
| ā | Our scheme | TESLA | Multilevel TESLA | Long-duration TESLA | Scalable TESLA |
| Structure | Single-chain | Single-chain | Multilevel | Multilevel | Merkel chain | Without using overlong hash chain | | | | | | Reinitializable | | | | | | Backward security | | | | | | Resistance with chosen plaintext attack | | | | | | Resistance with DoS attack (sensor node) | | | | | | Resistance with DoS attack (base station) | | | | | | Fresh node authentication (by base station) | | | | | | Fault tolerance | | | | | |
|
|
The length of top-level hash chain is unlimited. |