Review Article

A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Figure 2

Security threats in the IoT.