Research Article

Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA

Figure 5

Network topology used for a MITM attack.