Table 4.
Operations requirement of each proposed protocol.
Requirement | Liao | Zhao | Alamr | Naeem | Dinarvand | Benssalah | Zheng | Yang | Aloui | Izza | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
T | R | T | R | T | R | T | R | T | R | T | R | T | R | T | R | T | R | T | R | |
Random number | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 1 | 1 | 1 | 1 |
Scalar multiplication | 5 | 5 | 5 | 5 | 4 | 5 | 5 | 5 | 3 | 3 | 3 | 1 | 4 | 4 | 1 | 1 | 2 | 2 | 2 | 4 |
Point addition | 2 | 2 | 2 | 2 | 1 | 1 | 1 | 1 | 0 | 0 | 1 | 1 | 3 | 3 | 0 | 0 | 0 | 0 | 0 | 0 |
XOR operation | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 2 | 1 | 1 |
Hash function | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 2 | 0 | 0 | 3 | 3 | 0 | 0 | 4 | 4 | 2 | 1 | 6 | 7 |
T: tag, R: reader.