Here you have a study about different cryptographic methods in different IoT devices:
Midgar: Study of communications security among Smart Objects using a platform of heterogeneous devices for the Internet of Things
In this study, the authors (Sánchez-Arias, García, and García-Bustelo) explain the time that the different methods need to send messages and a comparison between the methods, about their current state and about the time that they needed.
Abstract
In last years, the Internet of Things has been a revolution in terms of applications and research. Currently, there are a great variety of nodes connected to each other to create different applications in areas, ranging from sport to business, inter alia. These applications compromise our private information about our bank accounts, health, and location. This makes us take safety measures to achieve a secure communication, where the interception of a message by a malicious user cannot compromise our privacy.