Abstract With the increase in the usage of wireless networks and their applications where broadcast transmission is widely used, it has become critical to authenticate broadcast messages. Several broadcast authentication techniques are currently available. However, no scheme is ideal for all broadcast transmission applications. Our goal is to classify, compare and analyze existing broadcast authentication techniques to enable designers to select an appropriate technique that suits their system, computation, communication and application requirements. Furthermore, this study provides better understanding of the research challenges that are still not addressed or only partially addressed.