Research Article

Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges

Figure 4

Dynamic key management schemes versus schemes for TCP data.