Review Article

Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

Table 3

Comparison of existing and lightweight authentication schemes.

Authentication protocolsSource authenticationData integrityImmediate authenticationTime synchronizationCommunication overheadComputation overheadCryptographic methodDoS ResistanceRobustness to packet lossMessage Cost

TESLAYesYesNoYesLowLowMD5NoYes2
μTESLAYesYesNoYesLowLowMD5NoYes3
Multilevel μTESLAYesYesNoYesLowLowMD5YesYes3
BABRAYesYesNoNoLowLowMD5YesYes3
Unbounded key chainsYesYesNoYesLowMediumSHA-1NoYes2
L-TESLAYesYesNoYesLowLowMD5NoYes3
X-TESLAYesYesNoYesLowLowMD5YesYes3
TESLA++YesYesNoYesLowLowMD5YesYes2
RPTYesYesNoYesLowLowMD5NoYes3
Hierarchical key chainsYesYesNoYesVery LowVery LowSHA-1NoYes1
Lightweight schemeYesYesNoYesVery LowVery LowSHA-1NoYes1