Research Article
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption
Table 4
Percentage improvement in computational cost.
| Schemes | Total computational cost of extant scheme (x) (%) | Total computational cost of proposed scheme (y) (%) | z (using the formula) (%) |
| Yu et al.’s scheme [13] | 86.23 | 5.28 | 93.87 | Kushwah et al.’s scheme [35] | 74.84 | 5.28 | 92.94 | Wei et al.’s scheme [36] | 130.66 | 5.28 | 95.95 | Shen et al.’s scheme [37] | 40.17 | 5.28 | 86.85 | Zhou et al.’s scheme [39] | 61.94 | 5.28 | 91.47 |
|
|
Percentage change, z = x − y/ x 100. |