Research Article

Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

Table 3

Performance analysis of the compared schemes.

SchemeProposed schemeZhu and Ma [4]Lee et al. [5]Wu et al. [6]Wu et al. [6]

Registration
 MU
 HA5 (h) + 2 ()2 (h) + 3 ()2 (h) + 3 ()2 (h) + 3 ()2 (h) + 1 ()
Authentication and key establishment
 MU4 (h) + 1 () + 1 Asym2 (h) + 3 () + 2 Sym4 (h) + 3 () + 2 Sym3 (h) + 1 () + 1 Sym5 (h) + 2 () + 1 Asym
 FA1 (h) + 1 Asym2 (h) + 1 () + 1 Sym + 2 Asym4 (h) + 1 () + 2 Sym + 2 Asym5 (h) + 3 Asym4 (h) + 2 () + 1 Asym
 HA6 (h) + 3 ()3 (h) + 1 Sym + 3 Asym3 (h) + 1 Sym + 2 Asym2 (h) + 2 Sym3 (h) + 3 ()

Total16 (h) + 6 () + 2 Asym9 (h) + 7 () + 3 Sym + 5 Asym13 (h) + 7 () + 5 Sym + 4 Asym12 (h) + 4 () + 3 Sym + 3 Asym14 (h) + 8 () + 2 Asym

(h): number of hash operation, ( ): number of XOR operation, Sym: number of symmetric key operation, Asym: number of asymmetric key operation.