Research Article
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things
Table 1
Computational cost comparison.
| Phases | Sender (Sensor/Detector) | Receiver (Actuator) |
| Detection Phase | 2M + 1P + 1E + 1H + 1XOR | | Implementation Phase | | 1M + 1P + 1H + 1XOR |
|
|