Research Article
Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems
Table 2
Execution time comparison (in seconds) when
and
.
| () | | ā | GREAT | PIP | CAIP | GREAT | PIP | CAIP |
| () | 12.6 | 16.0 | 1.9 | 6.5 | 16.0 | 1.9 | () | 25.3 | 32.0 | 3.7 | 13.1 | 32.0 | 3.7 | () | 38.0 | 48.0 | 5.6 | 19.7 | 48.0 | 5.6 | () | 50.7 | 64.0 | 7.5 | 26.2 | 64.0 | 7.5 | () | 63.3 | 80.0 | 9.4 | 32.8 | 80.0 | 9.4 | () | 76.0 | 96.0 | 11.2 | 39.4 | 96.0 | 11.2 | () | 88.7 | 112.0 | 13.1 | 45.9 | 112.0 | 13.1 | () | 101.4 | 128.0 | 15.0 | 52.5 | 128.0 | 15.0 | () | 114.0 | 144.0 | 16.9 | 59.1 | 144.0 | 16.9 | () | 126.8 | 160.0 | 18.7 | 65.6 | 160.0 | 18.7 |
|
|