Research Article

Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption

Table 4

Percentage improvement in computational cost.

SchemesTotal computational cost of extant scheme (x) (%)Total computational cost of proposed scheme (y) (%)z (using the formula) (%)

Yu et al.’s scheme [13]86.235.2893.87
Kushwah et al.’s scheme [35]74.845.2892.94
Wei et al.’s scheme [36]130.665.2895.95
Shen et al.’s scheme [37]40.175.2886.85
Zhou et al.’s scheme [39]61.945.2891.47

Percentage change, z = x − y/x 100.