Skip to main content
. 2019 Mar 6;19(5):1141. doi: 10.3390/s19051141

Figure 2.

Figure 2

Taxonomy of IoT authentication schemes.