Skip to main content

Table 2 Scheme analysis and comparison

From: Research on trusted DNP3-BAE protocol based on hash chain

Scheme Method Infrastructure Keys Computational complexity
Ours Hash chain / 1 n*HMAC, n*MAC,1*AES
BAE-Sym Session key / N n*HMAC, n*MAC,n*AES
BAE-Asym Digital signature PKI 2 N + 2 n*PKI
\