Secure Knowledge Management In Artificial Intelligence Era by Sanjay K. Sahay & Nihita Goel & Vishwas Patil & Murtuza Jadliwala

Secure Knowledge Management In Artificial Intelligence Era by Sanjay K. Sahay & Nihita Goel & Vishwas Patil & Murtuza Jadliwala

Author:Sanjay K. Sahay & Nihita Goel & Vishwas Patil & Murtuza Jadliwala
Language: eng
Format: epub
ISBN: 9789811538179
Publisher: Springer Singapore


Energy Consumption. During the authentication phase, the system takes a fixed amount of energy to execute various operations and to send different parameters. This is known as the energy consumption and it is measured in millijoule (mJ). The energy consumption is calculated as for the execution cost and for communication cost. Where, voltage power, current, the execution time, message size, and data rate (6100 Kbps). If the authentication protocol takes low execution time and less communication overhead, then it consumes less energy compared to other authentication schemes. The proposed protocol needs 5.80 ms as the execution time and 128 bytes in the communication, which are less compared to other authentication mechanisms [11–13, 15–17]. Therefore, the proposed scheme is also energy-efficient compared to other protocols.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.