Table 8 Communication cost comparison (in bits) of proposed schemes with similar recent schemes.

From: Two secure authentication protocols for mitigating vulnerabilities in IoD

Schemes

Rounds

Communication cost (bits)

Tanveer et al.10

3

1504

Irshad et al.11

3

3200

Zhang et al.22

3

1472

Gupta et al.23

5

2080

Choi et al.24

4

2368

Modarres and Sarbishaei26

4

2208

Nyangaresi et al.27

3

2624

Zhang et al.9

5

2144

Proposed scheme (a)

5

2784

Proposed scheme (b)

5

3424