Research Article
Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
Table 3
Distribution of transmission costs at various levels of the end-to-end solution.
| Level | Number of nodes node transfer bytes (bytes) | End-to-end solution | Number of bytes transmitted by the node in the double verification scheme (bytes) |
| 1 | 3 | 2156 | 14 | 2 | 9 | 736 | 14 | 3 | 27 | 236 | 14 | 4 | 81 | 82 | 14 | 5 | 243 | 32 | 14 | 6 | 729 | 8 | 14 | 7 | 2187 | 2 | 14 |
|
|