Research Article

A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks

Table 4

The computational cost of complex operations.

OperationDefinitionExecution time (ms)

Elliptic curve scalar point multiplication8.8
Elliptic curve scalar point addition0.057
Hash function0.0058
Bilinear pairing11.43
String to point hash operation26.1
Symmetric encryption18.37