Research Article
SUBBASE: An Authentication Scheme for Wireless Sensor Networks Based on User Biometrics
Table 5
Comparison of computational time between SUBBASe and existing schemes.
| Protocols | Registration | Login+ Authentication | Total | Total time |
| Yoon | 3 | 10 | 13 | 47.26 ms | Debiao | 3 | 8 +4tsym | 11 +4tsys=15 | 54.54 ms | Althobaiti | 2 | 6 + 2 +4 RC5 | 8 + 2T +4 RC5 | 36.37ms | Kaul | 6 | 16 | 22 | 79.97ms | Dongwoo | 6 | 14 | 20 | 72.7ms | SUBBASe | 2 | 7 +2Trc5 | 9 +2Trc5 | 33.24 ms |
|
|