Research Article

Cluster-Based Authentication Process in a Smart City

Figure 14

Total encryption and decryption times using variety of key lengths of RSA (asymmetric), ECC (asymmetric), and AES (symmetric) for “dialogue for getting service from the different cluster master.”