Research Article
Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems
Table 3
Execution time comparison (in seconds) when
and
.
| () | | ā | GREAT | PIP | CAIP | GREAT | PIP | CAIP |
| () | 12.6 | 16.0 | 6.2 | 6.5 | 16.0 | 6.2 | () | 25.3 | 32.0 | 12.5 | 13.1 | 32.0 | 12.5 | () | 38.0 | 48.0 | 18.7 | 19.7 | 48.0 | 18.7 | () | 50.7 | 64.0 | 24.9 | 26.2 | 64.0 | 24.9 | () | 63.3 | 80.0 | 31.2 | 32.8 | 80.0 | 31.2 | () | 76.0 | 96.0 | 37.4 | 39.4 | 96.0 | 37.4 | () | 88.7 | 112.0 | 43.6 | 45.9 | 112.0 | 43.6 | () | 101.4 | 128.0 | 49.9 | 52.5 | 128.0 | 49.9 | () | 114.0 | 144.0 | 56.1 | 59.1 | 144.0 | 56.1 | () | 126.8 | 160.0 | 62.3 | 65.6 | 160.0 | 62.3 |
|
|