Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 3 Computation performance comparison

From: A secure user authentication protocol for sensor network in data capturing

  Benenson et al. [ 7 ] Das [ 10 ] Chen and Shih [ 16 ] Yeh et al. [ 17 ] Yoon and Yoo [ 20 ] Ohood et al. [ 21 ] Yuan et al. [ 19 ] Wenbo et al. [ 22 ] Ours
Registration Phase 1Texp 1Th 1Th 4Th +2Tmp 3Th 2Th 4Th 3Th +1Tpm 4Th + 4Tpm + 3Taes
Login and Authentication Phase 2nTh +3nTexp 5Th 7Th 11Th + 4Tpa + 8Tpm + 2Te 10Th 4Trc +8Th 9Th 15Th +6Tpm 14Th + 6Tpair + 8Taes
Total 2nTh +3nTexp +1Texp 6Th 8Th 15Th + 4Tpa + 10Tpm + 2Te 13Th 4Trc + 10Th 13Th 18Th +7Tpm 18Th + 4Tpm + 11Taes + 6Tpair