sensors can connect and exchange information over the Internet. The importance of IoT
devices and data can be critical, so security constraints are required to keep IoT data safe
from intruders; authentication is one of basic and important means to confirm data privacy
and security. The nature of IoT devices as a resource contains devices required a special
authentication schema that does not consume high computing and energy resources. In this …