Research Article

The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach

Table 6

Computational cost comparison.

SchemesNewcomerThe guide + HelperTotalExecution Time (ms)

[2]87200.008
[3]6 + 2(5 + 2) + (8 + 3) + (5 + 24 + 81.052
Ours22 +284 + 283.64

is the execution time of the hash function; is the execution time of symmetric cryptographic algorithms.