Research Article
A Cost Effective Identity-Based Authentication Scheme for Internet of Things-Enabled Agriculture
Table 4
Comparison of computational cost in milliseconds.
| Scheme | Sender | Receiver | Total |
| Mehmood et al. [17] | 18.78 ms | 17.81 ms | 36.59 ms | Shen et al. [18] | 4.85 ms | 4.85 ms | 9.7 ms | Wu et al. [19] | 1.94 ms | 1.94 ms | 3.88 ms | Wang et al. [21] | 1.94 ms | 3.88 ms | 5.82 ms | Li et al. [24] | 1.94 ms | 2.91 ms | 4.85 ms | Harbi et al. [25] | 18.78 ms | 18.78 ms | 37.56 ms | Yuan et al. [26] | 1.94 ms | 2.91 ms | 4.85 ms | Proposed scheme | 0.96 ms | 1.44 ms | 2.4 ms |
|
|