Research Article
Lightweight and Anonymous Mutual Authentication Protocol for Edge IoT Nodes with Physical Unclonable Function
Table 5
The summary comparisons of protocols.
| Protocols | Security functions | Computation costs | Communication costs |
| [18] | Part | Highest | Highest | [10] | Part | Higher | Lowest | [21] | Part | ā | ā | [22] | Part | Higher | Higher | Our protocol | All | Lowest | Lowest |
|
|