Review Article
Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks
Table 3
The computational cost of complex operations.
| | Operations | Host node(s) |
| | Hash function | 0.00032 | | Fuzzy function | 0.0171 | | Chaotic map function | 0.0171 | | Encryption and decryption | 0.0056 |
|
|