Research Article

An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing

Table 9

Approximate time required for various operations.

NotationDescriptionApproximate computation
(Time to compute)Time (in milliseconds)

Hash function0.0005
ECC point multiplication7.3529
Symmetric encryption/decryption0.1303
QR code7.3529
Chaotic map7.3529
Message authentication code0.0005