Research Article

Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network

Figure 10

Comparison of computation and communication overhead (Au: authentication, KA: key agreement, and Reg: registration). (a) Cost on users for Au and KA. (b) Cost on the EC for Au and KA. (c) Cost on users with different devices. (d) Communication cost.
(a)
(b)
(c)
(d)