Babel of IoT Authentication Poses Security Challenges
Babel of IoT Authentication Poses Security Challenges
With more than 80 different schemes for authenticating devices either proposed or implemented, best practices and reference architectures are sorely needed, experts say.