Research Article

A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications

Figure 3

Cross-domain authentication process.