Skip to main content

Table 7 Computation cost comparison

From: A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city

References User (ms) Gateway (ms) Sensor (ms) Total Total (ms)
[1] \(12T_{h} + T_{Rep} + 2T_{m}\) \(10T_{h}\) \(3T_{h} + 2T_{m}\) \(25T_{h} + T_{Rep} + 4T_{m}\)  = 11.19
[12] \(1T_{h} + 2T_{m}\) \(4T_{h} + 4T_{m}\) \(3T_{h} + 2T_{m}\) \(8T_{h} + 8T_{m}\)  = 17.83
[15] \(8T_{h} + T_{Rep}\) \(11T_{h} + 2T\) \(5T_{h} + T\) \(24T_{h} + T_{Rep} + 3T\)  = \(2.2812\)
[17] \(9T_{h} + T_{Rep}\) \(6T_{h}\) \(6T_{h}\) \(20T_{h} + T_{Rep}\)  = 2.27
[26] \(10T_{h} + T_{Rep} + 2T_{m} + T_{s}\) \(10T_{h} + 2T_{s}\) \(6T_{h} + 2T_{m} + T_{s}\) \(26T_{h} + T_{Rep} + 4T_{m} + 5T_{s}\)  = 16.19
[27] \(10T_{h} + T_{Rep} + 2T_{m}\) \(11T_{h} { + }T\) \(4T_{h} + 2T_{m}\) \(25T_{h} + T_{Rep} + 4T_{m} { + }T\)  = \({11}{\text{.19 + }}O(n)\)
[28] \(5T_{h} + T_{Rep} + 5T_{m}\) \(4T_{h} + 5T_{m} { + }T\) \(3T_{h} + 4T_{m}\) \(12T_{h} + T_{Rep} + 14T_{m} { + }T\)  = \({33}{\text{.42 + }}O(n)\)
Ours \(8T_{h} + T_{Rep} + 3T_{m} + T_{s}\) \(7T_{h} + T_{m} + 2T_{s}\) \(5T_{h} + 2T_{m} + T_{s}\) \(20T_{h} + T_{Rep} + 6T_{m} + 4T_{s}\)  = 15.646