Research Article

A2 Chain: A Blockchain-Based Decentralized Authentication Scheme for 5G-Enabled IoT

Figure 7

Comparison of computational overhead. (a) Cost on users for authentication. (b) Cost on servers for authentication.
(a)
(b)