Skip to main content

Table 2 Scheme analysis and comparison

From: Research on trusted DNP3-BAE protocol based on hash chain

Scheme

Method

Infrastructure

Keys

Computational complexity

Ours

Hash chain

/

1

n*HMAC, n*MAC,1*AES

BAE-Sym

Session key

/

N

n*HMAC, n*MAC,n*AES

BAE-Asym

Digital signature

PKI

2 N + 2

n*PKI