Research Article

A Cross-Domain Authentication Optimization Scheme between Heterogeneous IoT Applications

Figure 6

Comparison of the time of each stage of certification.