Research Article

Efficient Authentication for Internet of Things Devices in Information Management Systems

Table 5

The computation overhead.

Protocol

Cao’s scheme
Sultan’s scheme
Our scheme