Research Article

Cluster-Based Authentication Process in a Smart City

Figure 12

Total secret key generation times using variety of hashing algorithms for “dialogues of different entities.”