Research Article
Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things
Table 4
Calculation cost comparison.
| Protocol | User (ms) | Gateway (ms) | Sensor (ms) | Total (ms) | Communication cost (bits) |
| Amin et al. [40] | 12 0.0882 | 18 0.045 | 6 0.0264 | 0.1596 | 9216 | Chen et al. [41] | 8 + 17.2552 | 3 + 2 16.1955 | 5 + 11.499 | 44.9497 | 4608 | Wu et al. [28] | 13 0.0637 | 3 + 2 16.1955 | 5 + 11.499 | 27.7582 | 8192 | Sadri and Asaar [13] | 6 + + 34.4554 | 10 + + 16.213 | 5 0.022 | 50.6904 | 5888 | Our protocol | 8 + 17.2522 | 10 + + 16.213 | 5 0.022 | 33.4872 | 6400 |
|
|