Table 19 Comparison of cryptographic schemes for IoT environments.
Scheme | Key Exchange | Key Derivation | Encryption Core | Estimated Overhead |
---|---|---|---|---|
AES-128 only | Pre-shared key | None | AES-128 | Low |
ECC + AES | ECC (per session) | None | AES-128 | Medium to High |
ECC + CA + AES (Proposed) | ECC (per image/session) | CA Rule 90 | AES-128 | Medium |
ECC + Hybrid CA + PRESENT | ECC (session-based) | Dynamic CA (nonlinear) | PRESENT (lightweight) | Low to Medium |