Research Article

Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things

Table 3

Time consumed by different phases.

PhaseDeviceHash Encryption /decryption Point addition

UserHonor 30s0.0049 ms17.213 ms0.4894 ms
GatewayMSI-GP630.0025 ms8.094 ms0.0527 ms
SensorLenovo-M715E0.0044 ms11.477 ms0.1723 ms