Research Article

A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications

Figure 2

Authorization process for cross-domain access.