Header and Body 4

Advantages

  • Security evaluation of the protocol shows that it fulfils the stated security requirements and addresses all IoT threat and attacks
  • Lightweight, thus addressing the resource-constrained IoT endpoints
  • Protocol does not require costly key cryptography operations, allow fast and efficient continuous authentication