Keywords :
computer network security;cryptographic protocols;Internet of Things;machine-to-machine communication;machine-to-machine communication technology;IIoT environment;IIoT domain;resource-constrained IoT devices;security issues;lightweight security mechanisms;lightweight authentication mechanism;industrial IoT environment;M2M protocols;M2M communications;Protocols;Authentication;Machine-to-machine communications;Sensors;Production;Quality of service;Industrial Internet of Things (IIoT);lightweight authentication;machine-to-machine (M2M) communications;security;sensors
Scopus citations®
without self-citations
209