Research Article
A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain
Table 2
Comparison of the computational overhead.
| | AU + KN |
| [9] | 18SM + 4PA + 8Exp + 4BP | [22] | 8SM + 2PA + 4EXP + 4BP | [32] | 36SM + 4AES + 5Exp + 15BP | [33] | 27PM + 46EXP + 14BP | [34] | 41PM + 71EXP + 22BP | Our CL-BASA | 14SM + 2PA + 6BP |
|
|