Research Article
Towards Trustworthy IoT: A Blockchain-Edge Computing Hybrid System with Proof-of-Contribution Mechanism
Figure 7
Total time cost of DACS. The four steps, respectively, represent production of symmetric key, symmetric encryption based on AES, signature, and decryption based on ECDSA.