Table 7 An examination of the bandwidth utilization of the proposed protocol, in contrast to multiple AKA protocols discussed in the literature, n represents to the number of IoVT devices and a represents to the number of authentication parameters sent to MME by UDM.
Protocol | Bandwidth consumption (Bits) |
|---|---|
P1: 5G-AKA33 | 1920n |
P2: Gharsallah rq s AKA10 | 848n + 656 |
P3: EPS-AKA50 | n(592 + 544a) |
P4: Miao’s AKA16 | 1760n + 1472 |
P5: Ouaissa’s AKA18 | 960n + 1344 |
P6: SEGB-AKA40 | 1600n + 1912 |
P7: EG-AKA39 | 1600n + 1088 |
P8: GLARAM43 | 1840n + 1860 |
P9: Choi’s AKA46 | 1200n + 1408 |
P10: Fu’s AKA48 | 2112n |
P11: Proposed Protocol | 768n + 672 |