Review Article
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
Table 3
Comparison of existing and lightweight authentication schemes.
| | Authentication protocols | Source authentication | Data integrity | Immediate authentication | Time synchronization | Communication overhead | Computation overhead | Cryptographic method | DoS Resistance | Robustness to packet loss | Message Cost |
| | TESLA | Yes | Yes | No | Yes | Low | Low | MD5 | No | Yes | 2 | | μTESLA | Yes | Yes | No | Yes | Low | Low | MD5 | No | Yes | 3 | | Multilevel μTESLA | Yes | Yes | No | Yes | Low | Low | MD5 | Yes | Yes | 3 | | BABRA | Yes | Yes | No | No | Low | Low | MD5 | Yes | Yes | 3 | | Unbounded key chains | Yes | Yes | No | Yes | Low | Medium | SHA-1 | No | Yes | 2 | | L-TESLA | Yes | Yes | No | Yes | Low | Low | MD5 | No | Yes | 3 | | X-TESLA | Yes | Yes | No | Yes | Low | Low | MD5 | Yes | Yes | 3 | | TESLA++ | Yes | Yes | No | Yes | Low | Low | MD5 | Yes | Yes | 2 | | RPT | Yes | Yes | No | Yes | Low | Low | MD5 | No | Yes | 3 | | Hierarchical key chains | Yes | Yes | No | Yes | Very Low | Very Low | SHA-1 | No | Yes | 1 | | Lightweight scheme | Yes | Yes | No | Yes | Very Low | Very Low | SHA-1 | No | Yes | 1 |
|
|