Research Article
A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure
Table 5
Computation and communication costs and smart card storage cost of related schemes.
| ā | Computation overhead | Running time (ms) | Communication cost (bits) | Storage cost (bits) | User | Server | CS |
| Zhou et al. [26] | | | | 18 | 3584 | 640 | Amin et al. [21] | | | | 11.5 | 2560 | 512 | Kumari et al. [20] | | | | 554.64 | 2624 | 576 | Mo et al. [25] | | | ā | 385.998 | 960 | 712 | Ghani et al. [35] | | | | 21.4 | 1792 | 384 | Martinez-Pelaez et al. [36] | | | | 89.1 | 3456 | 640 | Our scheme | | | | 159.1 | 2304 | 532 |
|
|