Next Article in Journal
The Biological Processes of Chloride Ions Removal from the Environment
Previous Article in Journal
Comparison Study on Coarseness Index and Maximum Diameter of Rock Fragments by Linear Cutting Tests
 
 
Article
Peer-Review Record

A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher

Appl. Sci. 2022, 12(17), 8817; https://doi.org/10.3390/app12178817
by Agus Winarno * and Riri Fitri Sari *
Reviewer 1:
Reviewer 3:
Appl. Sci. 2022, 12(17), 8817; https://doi.org/10.3390/app12178817
Submission received: 28 July 2022 / Revised: 24 August 2022 / Accepted: 27 August 2022 / Published: 1 September 2022
(This article belongs to the Topic IOT, Communication and Engineering)

Round 1

Reviewer 1 Report

The paper proposes an interesting method for secure end-to-end IoT communications. The paper is well organized and written. I have a comment.

-       All comparisons are done in sense of time and complexity. I suggest that the authors also compare different schemes in sense of security.

Author Response

The following is a list of revisions that have been made:
1. Added information security explanation on Line No. 40 to 49
2. Adding the advantages of the Secure End-to-End Encryption scheme on the MQTT protocol with Block Cipher-based Light-weight Cryptography Line No 69 to 76
3. Replace the word explanation in The paper is structured Line No. 77 to 81
4. Adding a table containing comparisons with previous research Line No 114
5. Adding a description to the conclusion of lines no. 599 to 608

Author Response File: Author Response.docx

Reviewer 2 Report

The manuscript is well organized and writed. 

Author Response

The following is a list of revisions that have been made:
1. Added information security explanation on Line No. 40 to 49
2. Adding the advantages of the Secure End-to-End Encryption scheme on the MQTT protocol with Block Cipher-based Light-weight Cryptography Line No 69 to 76
3. Replace the word explanation in The paper is structured Line No. 77 to 81
4. Adding a table containing comparisons with previous research Line No 114
5. Adding a description to the conclusion of lines no. 599 to 608

Author Response File: Author Response.docx

Reviewer 3 Report

Please see the attached file. 

Comments for author File: Comments.pdf

Author Response

The following is a list of revisions that have been made:
1. Added information security explanation on Line No. 40 to 49
2. Adding the advantages of the Secure End-to-End Encryption scheme on the MQTT protocol with Block Cipher-based Light-weight Cryptography Line No 69 to 76
3. Replace the word explanation in The paper is structured Line No. 77 to 81
4. Adding a table containing comparisons with previous research Line No 114
5. Adding a description to the conclusion of lines no. 599 to 608

Author Response File: Author Response.docx

Back to TopTop