Research Article

A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth

Table 13

Computation time of different operations.

OperationsTimeExperiment times

: one way hash function0.0394 ms1000000
TE/D: symmetric encryption/decryption0.5728 ms100000
: scalar multiplication in ECC-160 3.66 ms2733