Research Article
An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function
Table 3
Comparison of time consumed with other protocols.
| Protocol | Time consumed during authentication phase |
| Zhou et al. [4] | 2.56 CPU time | Kim and Lee [8] | 1.57 CPU time | Huang [7] | 0.895 CPU time | Our scheme | 0.256 CPU time |
|
|