Research Article
Cluster-Based Authentication Process in a Smart City
Figure 14
Total encryption and decryption times using variety of key lengths of RSA (asymmetric), ECC (asymmetric), and AES (symmetric) for “dialogue for getting service from the different cluster master.”