Research Article

Efficient Authentication for Internet of Things Devices in Information Management Systems

Figure 5

The comparison of communication cost.
(a)
(b)
(c)
(d)