Research Article

A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks

Table 2

Comparisons of computation and communication costs.

Protocols Wu et al.’s [16] Jiang et al.’s [17] Wang et al.’s [18] Li et al.’s [19] Our protocol

Computation time of user (ms)

Computation time of gateway (ms)

Computation time of sensor (ms)

Rounds4 44 4 4

Bandwidth3168bits 2689bits3968bits 2912bits 2976bits