Review Article

Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks

Table 3

The computational cost of complex operations.

OperationsHost node(s)

Hash function0.00032
Fuzzy function0.0171
Chaotic map function0.0171
Encryption and decryption0.0056