Research Article
A Cost Effective Identity-Based Authentication Scheme for Internet of Things-Enabled Agriculture
Table 3
Computational cost comparison with respect to major operations used.
| Scheme | Sender | Receiver | Total |
| Mehmood et al. [17] | | | | Shen et al. [18] | 5SM | 5SM | 10SM | Wu et al. [19] | 2SM | 2SM | 4SM | Wang et al. [21] | 2SM | 4SM | 6SM | Li et al. [24] | 2SM | 3SM | 5SM | Harbi et al. [25] | | | | Yuan et al. [26] | 2SM | 3SM | 5SM | Proposed scheme | 2HECDM | 3HECDM | 5HECDM |
|
|