Research Article

Two Secure Privacy-Preserving Data Aggregation Schemes for IoT

Figure 2

Comparison of the computational cost of one IoT device between Scheme-I and Scheme-II.