Research Article
A Lightweight Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth
Table 6
Computation cost of the login and authentication.
| Schemes | User | Sensor | Gateway | Total | Total (ms) |
| Wu et al. [9] | 11TH + 2TMUL + 1TE/D | 4TH + 2TMUL + 1TE/D | 11TH + 2TE/D | 26TH + 4TMUL + 4TE/D | 29.9432 | Wu et al. [14] | 13TH + 2TMUL | 4TH + 2TMUL | 14TH | 31TH + 4TMUL | 29.4240 | Chang and Le [11] | 7TH + 2TMUL | 5TH + 2TMUL | 9TH | 21TH + 4TMUL | 29.42 | Chen et al. [1] | 5TH + 3TMUL | 3TH + 2TMUL | 7TH + 1TMUL | 15TH + 6TMUL | 44.1234 | LightPriAuth | 5TH + 2TMUL | 4TH + 2TMUL | 8TH | 17TH + 4TMUL | 29.4184 |
|
|
In this table, the boldface ones are the ones with the least computation time.
|