Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Figure 10

Formal security verification techniques used by the surveyed protocols.