Review Article

Survey of Authentication and Authorization for the Internet of Things

Figure 5

Categorization of U2M and M2M solutions.