Table 5 Execution time of different operations used in this paper (in ms)34.
From: Two secure authentication protocols for mitigating vulnerabilities in IoD
Notation | Description | Drone/Gateway side | Server side |
|---|---|---|---|
\(T_h\) | Hash Function Execution time | 0.026 | 0.011 |
\(T_{mp}\) | ECC Multiplication Execution Time | 5.9 | 2.6 |
\(T_{PUF}\) | PUF Execution Time | 0.12 | – |
\(T_{fe}\) | Fuzzy Extractor Execution Time | 1.67 | 2.85 |
\(T_{pa}\) | ECC Add Execution Time | 0.30 | 0.11 |
\(T_s\) | Symmetric Encryption/Decryption Execution Time | 0.79 | 0.41 |
\(T_{cmap}\) | Chaotic Map Execution Time | 0.92 | 0.66 |