From: Research on trusted DNP3-BAE protocol based on hash chain
Scheme | Method | Infrastructure | Keys | Computational complexity |
---|---|---|---|---|
Ours | Hash chain | / | 1 | n*HMAC, n*MAC,1*AES |
BAE-Sym | Session key | / | N | n*HMAC, n*MAC,n*AES |
BAE-Asym | Digital signature | PKI | 2 N + 2 | n*PKI |