Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Figure 5

Impersonation attack, MS: Mobile Station.
(a) Before the impersonation attack
(b) After the impersonation attack