Advances, Systems and Applications
From: A secure user authentication protocol for sensor network in data capturing
Benenson et al. [ 7 ] | Das [ 10 ] | Chen and Shih [ 16 ] | Yeh et al. [ 17 ] | Yoon and Yoo [ 20 ] | Ohood et al. [ 21 ] | Yuan et al. [ 19 ] | Wenbo et al. [ 22 ] | Ours | |
---|---|---|---|---|---|---|---|---|---|
Registration Phase | 1Texp | 1Th | 1Th | 4Th +2Tmp | 3Th | 2Th | 4Th | 3Th +1Tpm | 4Th + 4Tpm + 3Taes |
Login and Authentication Phase | 2nTh +3nTexp | 5Th | 7Th | 11Th + 4Tpa + 8Tpm + 2Te | 10Th | 4Trc +8Th | 9Th | 15Th +6Tpm | 14Th + 6Tpair + 8Taes |
Total | 2nTh +3nTexp +1Texp | 6Th | 8Th | 15Th + 4Tpa + 10Tpm + 2Te | 13Th | 4Trc + 10Th | 13Th | 18Th +7Tpm | 18Th + 4Tpm + 11Taes + 6Tpair |