Research Article
Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network
Figure 10
Comparison of computation and communication overhead (Au: authentication, KA: key agreement, and Reg: registration). (a) Cost on users for Au and KA. (b) Cost on the EC for Au and KA. (c) Cost on users with different devices. (d) Communication cost.
(a) |
(b) |
(c) |
(d) |