Skip to main content
. 2020 Sep 10;20(18):5166. doi: 10.3390/s20185166

Table 4.

Computational cost of proposed protocol.

Phase I Phase II Total cost
User CE + CD + CH + CXOR CE + CD + 4CXOR 2CE + 2CD + CH + 5CXOR
AS 2CE + 2CD + CH + 2Cran + CXOR - 2CE + 2CD + CH + 2Cran + CXOR
Gateway CE + CD + CH + CXOR CE + CD + 3CXOR 2CE + 2CD + CH + 4CXOR
Total Cost 4CE + 4CD + 3CH + 2Cran + 3CXOR 2CE + 2CD + 7CXOR 6CE + 6CD + 3CH + 2Cran + 10CXOR

Acronyms: C: Computation, E: Encryption, D: Decryption, XOR: Ex-or operation, H: Hash, ran: random number generation, PhaseI: User device registration, PhaseII: Mutual authentication and secret key generation.