Security and Communication Networks / 2017 / Article / Tab 3

Research Article

Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

Table 3

Execution time comparison (in seconds) when and .

()
GREAT PIP CAIP GREAT PIP CAIP

() 12.6 16.0 6.2 6.5 16.0 6.2
() 25.3 32.0 12.5 13.1 32.0 12.5
() 38.0 48.0 18.7 19.7 48.0 18.7
() 50.7 64.0 24.9 26.2 64.0 24.9
() 63.3 80.0 31.2 32.8 80.0 31.2
() 76.0 96.0 37.4 39.4 96.0 37.4
() 88.7 112.0 43.6 45.9 112.0 43.6
() 101.4 128.0 49.9 52.5 128.0 49.9
() 114.0 144.0 56.1 59.1144.0 56.1
() 126.8 160.0 62.3 65.6 160.0 62.3