many small and complex devices can be connected to the internet at the same time. Several current security algorithms are computational in that it is intensive and so far this requires substantial processing power which is costly (Zheng

& Jamalipour