Research Article
A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
Table 2
Comparisons of computation and communication costs.
| Protocols | Wu et al.’s [16] | Jiang et al.’s [17] | Wang et al.’s [18] | Li et al.’s [19] | Our protocol |
| Computation time of user (ms) | | | | | |
| Computation time of gateway (ms) | | | | | |
| Computation time of sensor (ms) | | | | | |
| Rounds | 4 | 4 | 4 | 4 | 4 |
| Bandwidth | 3168bits | 2689bits | 3968bits | 2912bits | 2976bits |
|
|