Research Article

[Retracted] A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT

Figure 3

The process of key derivation.