Skip to main content

Advances, Systems and Applications

Table 3 Computation performance comparison

From: A secure user authentication protocol for sensor network in data capturing

 

Benenson et al. [ 7 ]

Das [ 10 ]

Chen and Shih [ 16 ]

Yeh et al. [ 17 ]

Yoon and Yoo [ 20 ]

Ohood et al. [ 21 ]

Yuan et al. [ 19 ]

Wenbo et al. [ 22 ]

Ours

Registration Phase

1Texp

1Th

1Th

4Th +2Tmp

3Th

2Th

4Th

3Th +1Tpm

4Th + 4Tpm + 3Taes

Login and Authentication Phase

2nTh +3nTexp

5Th

7Th

11Th + 4Tpa + 8Tpm + 2Te

10Th

4Trc +8Th

9Th

15Th +6Tpm

14Th + 6Tpair + 8Taes

Total

2nTh +3nTexp +1Texp

6Th

8Th

15Th + 4Tpa + 10Tpm + 2Te

13Th

4Trc + 10Th

13Th

18Th +7Tpm

18Th + 4Tpm + 11Taes + 6Tpair