Research Article
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks
Table 2
Performance and security comparison.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
. : one-time hash operation time; : elliptic curve point multiplication computation time; : running time of chaotic maps; : time for modular multiplication/division. . means the corresponding scheme fails to achieve this property; CM denotes chaotic maps; PFS denotes perfect forward secrecy. |