Research Article

Efficient Authentication for Internet of Things Devices in Information Management Systems

Table 6

The communication overhead.

ProtocolCommunication overhead

Cao’s scheme
Sultan’s scheme
Our scheme