Research Article
A Secure and Lightweight Three-Factor Remote User Authentication Protocol for Future IoT Applications
Table 4
Computation overhead comparison.
| Protocols | User | Sensor nodes | nodes | Total cost | Total estimation |
| [1] | | | | | 0.66 ms | [8] | | | | | 1.04 ms | [33] | | | | | 0.44 ms | [45] | | | | | 0.96 ms | [50] | | | | | 3.18 ms | [60] | | | | | 0.6 ms | Ours | | | | | 0.36 ms |
|
|