Research Article
An Elliptic Curve Menezes–Qu–Vanston-Based Authentication and Encryption Protocol for IoT
Table 4
Evaluation of generating scheme with concurrent keypair.
| Methods | ECC-bits | Time (ms) | Energy (J) |
| Traditional PKI | P-160 | 13.444004 | 7.355072 | P-192 | 17.535036 | 18.40548 | P-224 | 22.75026 | 32.761354 |
| Cloud-based protocol | P-160 | 3.6036 | 0.897609 | P-192 | 14.3934 | 1.321412 | P-224 | 14.4175 | 2.112316 |
| Edge base proposed protocol | P-160 | 2.4312 | 0.634586 | P-192 | 8.2825 | 0.905251 | P-224 | 9.3746 | 1.602835 |
|
|