Research Article

A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain

Figure 2

Data fields indicating domain-specific information encapsulated into transaction [9].