From: A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
References | User (ms) | Gateway (ms) | Sensor (ms) | Total | Total (ms) |
---|---|---|---|---|---|
[1] | \(12T_{h} + T_{Rep} + 2T_{m}\) | \(10T_{h}\) | \(3T_{h} + 2T_{m}\) | \(25T_{h} + T_{Rep} + 4T_{m}\) |  = 11.19 |
[12] | \(1T_{h} + 2T_{m}\) | \(4T_{h} + 4T_{m}\) | \(3T_{h} + 2T_{m}\) | \(8T_{h} + 8T_{m}\) |  = 17.83 |
[15] | \(8T_{h} + T_{Rep}\) | \(11T_{h} + 2T\) | \(5T_{h} + T\) | \(24T_{h} + T_{Rep} + 3T\) |  = \(2.2812\) |
[17] | \(9T_{h} + T_{Rep}\) | \(6T_{h}\) | \(6T_{h}\) | \(20T_{h} + T_{Rep}\) |  = 2.27 |
[26] | \(10T_{h} + T_{Rep} + 2T_{m} + T_{s}\) | \(10T_{h} + 2T_{s}\) | \(6T_{h} + 2T_{m} + T_{s}\) | \(26T_{h} + T_{Rep} + 4T_{m} + 5T_{s}\) |  = 16.19 |
[27] | \(10T_{h} + T_{Rep} + 2T_{m}\) | \(11T_{h} { + }T\) | \(4T_{h} + 2T_{m}\) | \(25T_{h} + T_{Rep} + 4T_{m} { + }T\) |  = \({11}{\text{.19 + }}O(n)\) |
[28] | \(5T_{h} + T_{Rep} + 5T_{m}\) | \(4T_{h} + 5T_{m} { + }T\) | \(3T_{h} + 4T_{m}\) | \(12T_{h} + T_{Rep} + 14T_{m} { + }T\) |  = \({33}{\text{.42 + }}O(n)\) |
Ours | \(8T_{h} + T_{Rep} + 3T_{m} + T_{s}\) | \(7T_{h} + T_{m} + 2T_{s}\) | \(5T_{h} + 2T_{m} + T_{s}\) | \(20T_{h} + T_{Rep} + 6T_{m} + 4T_{s}\) |  = 15.646 |