From: 5G wireless P2MP backhaul security protocol: an adaptive approach
Protocols | Computation overhead | |||
---|---|---|---|---|
 | TM | HUB | ASF | Total |
EAP-AKA | 9CHM | – | 9CHM | 18CHM |
EAP-TLS | 1CAS+1CCV+4CHM+2CSYM | – | 1CAS+1CHM+1CSYM+1CSV+1CDS | 1CAS+1CCV+1CSV+1CDS+8CHM+4CSYM |
EAP-IKEv2 | 3CSYM+1CDH+1CCV+1CDS+1CSV+1CHM | – | 3CSYM+1CDH+1CCV+1CDS+1CSV+1CHM |  |
HIP | 1Cpuzzle+1CSV+1CDH+1CDS+1CSYM+1CHM | 1CSV+1CDH+1CDS+1CSYM+1CHM | - | 1Cpuzzle+2CSV+2CDH+2CDS+2CSYM+2CHM |
P2MP | 8CHM+1CDH | 6CHM+1CDH | 2CHM | 16CHM+2CDH |