Skip to main content

Table 6 Comparison of protocols by computation overhead

From: 5G wireless P2MP backhaul security protocol: an adaptive approach

Protocols

Computation overhead

 

TM

HUB

ASF

Total

EAP-AKA

9CHM

–

9CHM

18CHM

EAP-TLS

1CAS+1CCV+4CHM+2CSYM

–

1CAS+1CHM+1CSYM+1CSV+1CDS

1CAS+1CCV+1CSV+1CDS+8CHM+4CSYM

EAP-IKEv2

3CSYM+1CDH+1CCV+1CDS+1CSV+1CHM

–

3CSYM+1CDH+1CCV+1CDS+1CSV+1CHM

 

HIP

1Cpuzzle+1CSV+1CDH+1CDS+1CSYM+1CHM

1CSV+1CDH+1CDS+1CSYM+1CHM

-

1Cpuzzle+2CSV+2CDH+2CDS+2CSYM+2CHM

P2MP

8CHM+1CDH

6CHM+1CDH

2CHM

16CHM+2CDH

  1. CSYM cost for performing a symmetric encryption/decryption, CAS cost for performing an asymmetric encryption/decryption, CDS cost for performing a digital signature, CSV cost for performing a signature validation, CDH cost for performing a Diffie-Hellman operation, CHM cost for performing a one-way HMAC function, CCV cost for performing a certificate validation, Cpuzzle cost for performing a puzzle–cryptographic challenge