Table 9 The total storage cost comparison of proposed schemes with other similar schemes.

From: Two secure authentication protocols for mitigating vulnerabilities in IoD

Schemes

Storage cost (bits)

Tanveer et al.10

480

Irshad et al.11

1760

Zhang et al.22

320

Gupta et al.23

800

Choi et al.24

320

Modarres and Sarbishaei26

960

Nyangaresi et al.27

1440

Zhang et al.9

480

Proposed scheme (a)

480

Proposed scheme (b)

480