Research Article

Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol

Figure 2

Organizational chart of identification step.