“…Based on [93] and [114] Tsig= 0,47 s. Table 3 shows the computational requirement pf the studied authentication schemes. The two-factor lightweight authentication protocols [90], [94], [95], [97], [107], [109], [110], [111], [120], [121], [123], and [125] need 24Th, 21Th+ 4Ts, 42Th, 42Th+Ts, 6Taes + 2Th, 16Th, 6Th+9Ts, 2Ts, 17Th, 16Th, 20Th+2Tpuf, and 30Th respectively. The three-factor lightweight authentication protocols [99], [102], [103], [105], [108], [112], [113], and [117] require 25Th+Tf+4Ts, 35Th+Tf, 15Th+Tf+2Ts, 34Th+2Tf+Tpuf, 29Th+Tf, 24Th+2Ts, 18Th + 2Tf, and 2Tp + 16Th+Tf respectively.…”