Research Article
An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function
Table 2
Comparison of computation cost with other protocols.
| Protocol | Authentication and establishment phase |
| Zhou et al. [4] | | Kim and Lee [8] | | Huang [7] | | Lee et al. [11] | | Our scheme | |
|
|