Table 4 Analysis of Handover Delay comparisons.
From: Implementation of a novel secured authentication protocol for cyber security applications
Comparisons of handover delay | ||
|---|---|---|
| Â | 3GPP R16 | Proposed Protocol |
1 | 0.5 | 0.99 |
2 | 0.252 | 0.82 |
3 | 0.52 | 0.15 |
4 | 0.32 | 0.14 |
5 | 0.78 | 0.07 |
6 | 0.5 | 0.1 |
7 | 0.52 | 0.05 |
8 | 0.4 | 0.03 |
9 | 0.55 | 0.1 |
10 | 0.6 | 0.08 |