Review Article
Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks
Table 3
The computational cost of complex operations.
| Operations | Host node(s) |
| Hash function | 0.00032 | Fuzzy function | 0.0171 | Chaotic map function | 0.0171 | Encryption and decryption | 0.0056 |
|
|