Research Article

An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment

Table 3

Performance comparison among relevant schemes in wireless sensor networks.

Computation overhead Communication cost The evaluation criteria in [24]
Login(ms) Auth.(ms) Login Auth. S1 S2 S3 S4 S5 S6 S7 S8 S9 S10 S11 S12 S13

Maitra et al. (2016) [25]+640 bits 1280 bits
Kumari et al. (2017) [26]++2176 bits9088 bits
Amin et al. (2018) [3]640 bits1920 bits
Our scheme++1408 bits4096 bits

denotes the time of modular exponentiation operation, denotes scalar multiplication on elliptic curve, denotes hash computation, denotes symmetric encryption/decryption, (, , , [20]). Let be 32-bit long; Let , , , output of symmetric encryption, timestamp, random numbers be 128-bit long; let , , be 1024-bit long. means the property is satisfied; means the property is not satisfied. Note that the evaluation criteria in [24] are also applied to cloud computing environment when regarding as the sensor node, while the considerations on designing authentication scheme of this two environment are quite different due to their different network attributes.