Table 19 Comparison of cryptographic schemes for IoT environments.

From: Cellular automata based key distribution for lightweight hybrid image encryption with elliptic curve cryptography

Scheme

Key Exchange

Key Derivation

Encryption Core

Estimated Overhead

AES-128 only

Pre-shared key

None

AES-128

Low

ECC + AES

ECC (per session)

None

AES-128

Medium to High

ECC + CA + AES (Proposed)

ECC (per image/session)

CA Rule 90

AES-128

Medium

ECC + Hybrid CA + PRESENT

ECC (session-based)

Dynamic CA (nonlinear)

PRESENT (lightweight)

Low to Medium