Research Article

A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain

Figure 7

The authentication and key agreement process of our CL-BASA scheme.