A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications
The edge devices connected to the Internet of Things (IoT) infrastructures are increasingly susceptible to piracy.These pirated edge 2.75x100 devices pose a serious threat to security, as an adversary can get access to the private network through these non-authentic devices.It is necessary to authenticate an edge device over an unsecured channel to