Research Article
Enhanced Authentication Protocol for the Internet of Things Environment
Table 3
Computational cost of the proposed protocol.
| Protocols | | | Total computation |
| Ours | 4 4.252 ms | 5 0.0135 ms | 4.2655 ms | Alzahrani and Mahmood [12] | 3 3.189 ms | 5 0.0135 ms | 3.2025 ms | Kumari et al. [20] | 3 + 6 9.861 ms | 4 + 6 0.0354 ms | 9.8964 ms | Chikouche et al. [13] | 5 + 5 10.874 ms | 4 + 5 0.0313 ms | 10.9053 ms | Chaudhry et al. [28] | 7 + 2 + 2 12.107 ms | 6 + 2 + 2 0.0298 ms | 12.1368 ms | Melki et al. [29] | 5 5.314 ms | 5 0.0135 ms | 5.3275 ms | Panda and Chattopadhyay [30] | 4 + 5 9.812 ms | 5 + 5 0.034 ms | 9.8460 ms |
|
|