Review Article

A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Figure 1

Security requirements in IoT perimeter [6].