Review Article
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
Table 3
Comparison of existing and lightweight authentication schemes.
| Authentication protocols | Source authentication | Data integrity | Immediate authentication | Time synchronization | Communication overhead | Computation overhead | Cryptographic method | DoS Resistance | Robustness to packet loss | Message Cost |
| TESLA | Yes | Yes | No | Yes | Low | Low | MD5 | No | Yes | 2 | μTESLA | Yes | Yes | No | Yes | Low | Low | MD5 | No | Yes | 3 | Multilevel μTESLA | Yes | Yes | No | Yes | Low | Low | MD5 | Yes | Yes | 3 | BABRA | Yes | Yes | No | No | Low | Low | MD5 | Yes | Yes | 3 | Unbounded key chains | Yes | Yes | No | Yes | Low | Medium | SHA-1 | No | Yes | 2 | L-TESLA | Yes | Yes | No | Yes | Low | Low | MD5 | No | Yes | 3 | X-TESLA | Yes | Yes | No | Yes | Low | Low | MD5 | Yes | Yes | 3 | TESLA++ | Yes | Yes | No | Yes | Low | Low | MD5 | Yes | Yes | 2 | RPT | Yes | Yes | No | Yes | Low | Low | MD5 | No | Yes | 3 | Hierarchical key chains | Yes | Yes | No | Yes | Very Low | Very Low | SHA-1 | No | Yes | 1 | Lightweight scheme | Yes | Yes | No | Yes | Very Low | Very Low | SHA-1 | No | Yes | 1 |
|
|