Skip to main content

Table 7 Computation cost comparison

From: A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city

References

User (ms)

Gateway (ms)

Sensor (ms)

Total

Total (ms)

[1]

\(12T_{h} + T_{Rep} + 2T_{m}\)

\(10T_{h}\)

\(3T_{h} + 2T_{m}\)

\(25T_{h} + T_{Rep} + 4T_{m}\)

 = 11.19

[12]

\(1T_{h} + 2T_{m}\)

\(4T_{h} + 4T_{m}\)

\(3T_{h} + 2T_{m}\)

\(8T_{h} + 8T_{m}\)

 = 17.83

[15]

\(8T_{h} + T_{Rep}\)

\(11T_{h} + 2T\)

\(5T_{h} + T\)

\(24T_{h} + T_{Rep} + 3T\)

 = \(2.2812\)

[17]

\(9T_{h} + T_{Rep}\)

\(6T_{h}\)

\(6T_{h}\)

\(20T_{h} + T_{Rep}\)

 = 2.27

[26]

\(10T_{h} + T_{Rep} + 2T_{m} + T_{s}\)

\(10T_{h} + 2T_{s}\)

\(6T_{h} + 2T_{m} + T_{s}\)

\(26T_{h} + T_{Rep} + 4T_{m} + 5T_{s}\)

 = 16.19

[27]

\(10T_{h} + T_{Rep} + 2T_{m}\)

\(11T_{h} { + }T\)

\(4T_{h} + 2T_{m}\)

\(25T_{h} + T_{Rep} + 4T_{m} { + }T\)

 = \({11}{\text{.19 + }}O(n)\)

[28]

\(5T_{h} + T_{Rep} + 5T_{m}\)

\(4T_{h} + 5T_{m} { + }T\)

\(3T_{h} + 4T_{m}\)

\(12T_{h} + T_{Rep} + 14T_{m} { + }T\)

 = \({33}{\text{.42 + }}O(n)\)

Ours

\(8T_{h} + T_{Rep} + 3T_{m} + T_{s}\)

\(7T_{h} + T_{m} + 2T_{s}\)

\(5T_{h} + 2T_{m} + T_{s}\)

\(20T_{h} + T_{Rep} + 6T_{m} + 4T_{s}\)

 = 15.646