Research Article
An Elliptic Curve Menezes–Qu–Vanston-Based Authentication and Encryption Protocol for IoT
Table 5
Memory consumption in KB.
| Methods | ECC bits | Single user | Concurrent users |
| Traditional PKI | P-160 | 3,809.92 | 24,794.56 | P-192 | 9,313.11 | 75,827.24 | P-224 | 12,347.93 | 93,290.05 |
| Cloud-based protocol | P-160 | 160.05 | 1,125.57 | P-192 | 1,125.57 | 5,303.21 | P-224 | 1,165.64 | 8,490.73 |
| Edge-based proposed protocol | P-160 | 138.32 | 890.89 | P-192 | 632.84 | 4,987.64 | P-224 | 1,093.43 | 78,297.50 |
|
|