Skip to main content
. 2020 Dec 28;8(21):15694–15703. doi: 10.1109/JIOT.2020.3047662

TABLE V. Computation Cost Comparison of MASK Protocol Versus Conventional Protocols.

Scheme Computation Cost
[10] Inline graphic
[16] Inline graphic
[18] Inline graphic
[21] Inline graphic
[22] Inline graphic
[23] Inline graphic
[24] Inline graphic
[25] Inline graphic
MASK Inline graphic

Acronyms: Inline graphic - Computation, Inline graphic - Computation of asymmetric encryption, Inline graphic - Computation of asymmetric decryption, Inline graphic - Computation of Hash, Inline graphic - Computation of symmetric encryption, Inline graphic - Computation of symmetric decryption, Inline graphic - Computation of hash based MAC, Inline graphic - Computation of random number, Inline graphic - Computation of Physically Unclonable Function, Inline graphic - Computation of bio-metric, Inline graphic - Computation of modulus, Inline graphic - Computation of Bit-wise XOR, Inline graphic - Computation of Scalar Multiplication, Integers - defines the frequency of operation.