Research Article

[Retracted] An Identity-Based Encryption Method for SDN-Enabled Source Routing Systems

Table 2

Overhead of cryptographic operations.

OperationTime in ms.

MSK and SP generation19
SK formation3.8
Encryption3.9
Decryption4.7