Research Article

A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications

Figure 4

Authorization time allocation for different domain values (T).