Research Article

Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment

Table 3

Comparison of computation costs.

P1P2P3P4

Xue et al. [11]7H + 2X5H + 5X25H + 25X37H + 32X
Improved protocol7H + 3X5H + 6X18H + 21X30H + 30X

P1: registration phase; P2: login phase; P3: authentication phase; P4: total computation cost; H: hash computation and its time cost; X: xor operation and its time cost.