Research Article
Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things
Table 3
Time consumed by different phases.
| Phase | Device | Hash | Encryption /decryption | Point addition |
| User | Honor 30s | 0.0049 ms | 17.213 ms | 0.4894 ms | Gateway | MSI-GP63 | 0.0025 ms | 8.094 ms | 0.0527 ms | Sensor | Lenovo-M715E | 0.0044 ms | 11.477 ms | 0.1723 ms |
|
|