Research Article

A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain

Table 2

Comparison of the computational overhead.

AU + KN

[9]18SM + 4PA + 8Exp + 4BP
[22]8SM + 2PA + 4EXP + 4BP
[32]36SM + 4AES + 5Exp + 15BP
[33]27PM + 46EXP + 14BP
[34]41PM + 71EXP + 22BP
Our CL-BASA14SM + 2PA + 6BP