Research Article

An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure

Figure 5

Comparison of proposed and related scheme communication overhead.