Research Article

A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things

Table 1

Computational cost comparison.

Phases Sender (Sensor/Detector) Receiver (Actuator)

Detection Phase 2M + 1P + 1E + 1H + 1XOR
Implementation Phase 1M + 1P + 1H + 1XOR