Research Article

[Retracted] Certificateless Batch Authentication Scheme and Intrusion Detection Model Based on the Mobile Edge Computing Technology NDN-IoT Environment

Table 1

Comparison of this scheme with other schemes.

ProgramThe time of the signcryption process (ms)The time of the decryption process (ms)

A bilinear pairing operation232.428
A dot multiplication operation on intrusion detection
Addition operation on an intrusion detection135.328
An exponentiation on intrusion detection134.248
Scheme of this paper118.823