Skip to main content
. 2021 Apr 26;21(9):3025. doi: 10.3390/s21093025

Figure 5.

Figure 5

Constrained Application Protocol (COAP) replay attack.