Research Article
A Secure Data Dissemination in a DHT-Based Routing Paradigm for Wireless Ad Hoc Network
Table 8
Time complexity of joining operation with authentication and verification.
| # | Statement | Unit cost | Operation count | Total cost | Remarks |
| Time complexity of Algorithm 1 | 1 | If does not receive a hello message and at least three time interval T expires then | | | | Cost of the wait interval | 2 | Initialize as security parameters | | | | Cost of initialization (identity card and key pair generation cost) | 3 | |
| 1 1 | | Cost of access Cost of storing | 4 | else | | | 5 | Initialize as security parameters | | | | Cost of initialization (identity card and key pair generation cost) | 6 | |
|
|
| Cost of encryption Cost of credential exchange | 7 | |
|
|
| Cost of encryption Cost of credential exchange | 8 | endif | | | Time complexity of Algorithm 3 | 1 | |
|
|
| Cost to access the neighbor list Cost of encryption Cost of sending credential | 2 | |
|
|
| Cost to access the neighbor list Cost of encryption Cost of sending credential | 3 | |
|
|
| Cost to access the neighbor list Cost of encryption Cost of sending credential | Adding all of the components to find out total time complexity.
|
|
|