Research Article

Lightweight and Anonymous Mutual Authentication Protocol for Edge IoT Nodes with Physical Unclonable Function

Table 5

The summary comparisons of protocols.

ProtocolsSecurity functionsComputation costsCommunication costs

[18]PartHighestHighest
[10]PartHigherLowest
[21]Part——
[22]PartHigherHigher
Our protocolAllLowestLowest