Research Article
A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks
Table 5
Computational cost comparison.
| | Das et al.’s protocol [32] | Chen et al.’s protocol [35] | Wu et al.’s protocol [36] | Our protocol |
| User | | | | | Gateway | | | | | Sensor | | | | | Total | | | | |
|
|