Research Article
The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach
Table 6
Computational cost comparison.
| Schemes | Newcomer | The guide + Helper | Total | Execution Time (ms) |
| [2] | 8 | 7 | 20 | 0.008 | [3] | 6 + 2 | (5 + 2) + (8 + 3) + (5 + | 24 + 8 | 1.052 | Ours | 2 | 2 +28 | 4 + 28 | 3.64 |
|
|
is the execution time of the hash function; is the execution time of symmetric cryptographic algorithms. |