Return to Article Details An Efficient Identity Authentication protocol for layer 2 security sourced on ECC for IoT communications Download Download PDF