Research Article

Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study

Figure 12

Comparison of the authentication process with and without SHA-256.
(a) Framework without using SHA-256
(b) Framework using SHA-256