Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Figure 3

Classification of attacks in the IoT.