Research Article

A Secure Data Dissemination in a DHT-Based Routing Paradigm for Wireless Ad Hoc Network

Table 8

Time complexity of joining operation with authentication and verification.

#StatementUnit costOperation countTotal costRemarks

Time complexity of Algorithm 1
1If does not receive a hello message and at least three time interval T expires thenCost of the wait interval
2Initialize as security parametersCost of initialization (identity card and key pair generation cost)
3
1
1
Cost of access
Cost of storing
4else
5Initialize as security parametersCost of initialization (identity card and key pair generation cost)
6


Cost of encryption
Cost of credential exchange
7


Cost of encryption
Cost of credential exchange
8endif
Time complexity of Algorithm 3
1





Cost to access the neighbor list
Cost of encryption
Cost of sending credential
2





Cost to access the neighbor list
Cost of encryption
Cost of sending credential
3





Cost to access the neighbor list
Cost of encryption
Cost of sending credential
Adding all of the components to find out total time complexity.