D Li, W Peng, W Deng,
F Gai - 2018 27th International …, 2018 - ieeexplore.ieee.org
The existing identity authentication of IoT devices mostly depends on an intermediary
institution, ie, a CA server, which suffers from the single-point-failure attack. Even worse, the …