Research Article

A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks

Table 5

Computational cost comparison.

Das et al.’s protocol [32]Chen et al.’s protocol [35]Wu et al.’s protocol [36]Our protocol

User
Gateway
Sensor
Total