Table 5 Execution time of different operations used in this paper (in ms)34.

From: Two secure authentication protocols for mitigating vulnerabilities in IoD

Notation

Description

Drone/Gateway side

Server side

\(T_h\)

Hash Function Execution time

0.026

0.011

\(T_{mp}\)

ECC Multiplication Execution Time

5.9

2.6

\(T_{PUF}\)

PUF Execution Time

0.12

\(T_{fe}\)

Fuzzy Extractor Execution Time

1.67

2.85

\(T_{pa}\)

ECC Add Execution Time

0.30

0.11

\(T_s\)

Symmetric Encryption/Decryption Execution Time

0.79

0.41

\(T_{cmap}\)

Chaotic Map Execution Time

0.92

0.66