Research Article

A Cost Effective Identity-Based Authentication Scheme for Internet of Things-Enabled Agriculture

Table 3

Computational cost comparison with respect to major operations used.

SchemeSenderReceiverTotal

Mehmood et al. [17]
Shen et al. [18]5SM5SM10SM
Wu et al. [19]2SM2SM4SM
Wang et al. [21]2SM4SM6SM
Li et al. [24]2SM3SM5SM
Harbi et al. [25]
Yuan et al. [26]2SM3SM5SM
Proposed scheme2HECDM3HECDM5HECDM