Research Article

An Automata Based Intrusion Detection Method for Internet of Things

Figure 3

Attack scenario 3.