Research Article

Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks

Table 2

Performance and security comparison.

Related schemes Computation cost on log-auth phasesPFSKey technology
HashECCRSA

Li et al. (2018) [25]
Amin et al. (2018) [8]
Wu et al. (2017) [9]
Roy et al. (2017) [45]
Moon et al. (2017) [50]
Srinivas et al. (2017) [51]
Das et al. (2016) [52]
Chang et al. (2016) [53]
Vaidya et al. (2016) [54]
Odelu et al. (2015) [55]

. : one-time hash operation time; : elliptic curve point multiplication computation time; : running time of chaotic maps; : time for modular multiplication/division.
. means the corresponding scheme fails to achieve this property; CM denotes chaotic maps; PFS denotes perfect forward secrecy.