Research Article
An Elliptic Curve Menezes–Qu–Vanston-Based Authentication and Encryption Protocol for IoT
Table 5
Memory consumption in KB.
| | Methods | ECC bits | Single user | Concurrent users |
| | Traditional PKI | P-160 | 3,809.92 | 24,794.56 | | P-192 | 9,313.11 | 75,827.24 | | P-224 | 12,347.93 | 93,290.05 |
| | Cloud-based protocol | P-160 | 160.05 | 1,125.57 | | P-192 | 1,125.57 | 5,303.21 | | P-224 | 1,165.64 | 8,490.73 |
| | Edge-based proposed protocol | P-160 | 138.32 | 890.89 | | P-192 | 632.84 | 4,987.64 | | P-224 | 1,093.43 | 78,297.50 |
|
|