Research Article

Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach

Table 1

Security strength comparison of key size combinations for various cryptographic algorithms.

Key size (bits)Ratio
SecuritySymmetric encryption algorithmECCRSA/DH/DSA

80Skipjack160–22310241:6–30
1123DES224–2552048
128AES-128256–3833072
192AES-192384–5117680
256AES-256512–more15360