Research Article
A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks
Table 4
The computational cost of complex operations.
| Operation | Definition | Execution time (ms) |
| | Elliptic curve scalar point multiplication | 8.8 | | Elliptic curve scalar point addition | 0.057 | | Hash function | 0.0058 | | Bilinear pairing | 11.43 | | String to point hash operation | 26.1 | | Symmetric encryption | 18.37 |
|
|