Skip to main content

Table 6 The comparisons of computational costs

From: Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

protocol

\(U_i\) (ms)

\(S_j\) (ms)

TCS (ms)

Tocal (ms)

Zhou et al. [43]

\(10T_H\approx 0.041\)

\(7T_H\approx 0.0238\)

\(19T_H\approx 0.0437\)

0.1085

Martinez-Pelaez et al. [45]

\(3T_E+7T_H\approx 0.7694\)

\(3T_E+6T_h\approx 0.5442\)

\(2T_E+26T_H\approx 0.335\)

1.6486

Kang et al. [47]

\(8T_H\approx 0.0328\)

\(4T_H\approx 0.0136\)

\(11T_H\approx 0.0253\)

0.0717

Wu et al. [48]

\(12T_H \approx 0.0492\)

\(8T_H\approx 0.0272\)

\(19T_H\approx 0.0437\)

0.1201

Huang et al. [49]

\(8T_H\approx 0.0328\)

\(4T_H\approx 0.0136\)

\(10T_H\approx 0.023\)

0.0694

Ours

\(10T_H\approx 0.041\)

\(5T_H\approx 0.017\)

\(12T_H\approx 0.0276\)

0.0856

  1. Here, \(T_H\) and \(T_E\) are defined as the executing time of hash and symmetric encryption/decryption operations