Research Article

Towards Trustworthy IoT: A Blockchain-Edge Computing Hybrid System with Proof-of-Contribution Mechanism

Figure 7

Total time cost of DACS. The four steps, respectively, represent production of symmetric key, symmetric encryption based on AES, signature, and decryption based on ECDSA.