Research Article

Zero-Trust-Based Protection Scheme for Users in Internet of Vehicles

Figure 3

Verification process of device fingerprint library.