Next Article in Journal
Efficient Garbage Collection Algorithm for Low Latency SSD
Next Article in Special Issue
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions
Previous Article in Journal
The New Method of Active SLAM for Mapping Using LiDAR
 
 
Article
Peer-Review Record

Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home

Electronics 2022, 11(7), 1083; https://doi.org/10.3390/electronics11071083
by Ziaur Rahman 1,*, Xun Yi 1, Mustain Billah 2, Mousumi Sumi 3 and Adnan Anwar 4
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Reviewer 3: Anonymous
Electronics 2022, 11(7), 1083; https://doi.org/10.3390/electronics11071083
Submission received: 11 March 2022 / Revised: 29 March 2022 / Accepted: 29 March 2022 / Published: 30 March 2022
(This article belongs to the Special Issue Security of Wireless Communications)

Round 1

Reviewer 1 Report

  1. The article does not assess the effectiveness of the proposed encryption method for data protection.
  2. The article does not estimate the required computing resource and network characteristics for the implementation of this algorithm.
    Have these studies been carried out or are these future works?

Author Response

Please feel free to find the attached file.

Author Response File: Author Response.pdf

Reviewer 2 Report

  • The correspondence star is missing in the authors list
  • Please check that all abbreviations are well explained - e.g. line 12: S-box
  • Line 41: In line that
  • Line 48: that contributes
  • Line 56: technique.
  • Line 59: to to
  • Line 65: uses
  • Line 75: LZ78 Algorithm <-- please include a source here
  • Line 109: IoT
  • Line 166: such as
  • Line 255: we need some more complicated and faster procedures <-- please explain that better!
  • Line 270: Table 1
  • Line 335: XOR stands for?
  • Line 358: wired cameras are more secure than Wi-Fi cameras <-- Why?
  • Please insert a Discussion section before the Conclusion
  • Line 400: we devised

Author Response

Please feel free to find the attached file.

Author Response File: Author Response.pdf

Reviewer 3 Report

The authors demonstrated a novel approach for encrypting massive volumes of data and utilised in an IoT based smart home environment. The results are interesting, however, some revisions are required before being published.

  1. Sections 1, 2 and 3 could be merged and abridged. It is too long for a research article.
  2. Figure 3 could be described more in detail than that in the current version.
  3. Figures 6 and 7 should be better described and discussed to support the discussion in 5.2.
  4. The security of the proposed approach is needed to be anaylised and discussed.

Author Response

Please feel free to find the attached file.

Author Response File: Author Response.pdf

Round 2

Reviewer 3 Report

All concerns have been sufficiently addressed. I would recommended this mauscript to be published at current form. 

Back to TopTop