Skip to main content

Table 2 Number of XOR operations

From: An efficient MAC-based scheme against pollution attacks in XOR network coding-enabled WBANs for remote patient monitoring systems

 

Proposed scheme

[24]

MAC

l(u−1)

lu

Verify

u−1

lu