[1]
P. M. Sudhir Dawra, “An In-Depth Evaluation of Protocols for IoT Security Requirements”, DE, pp. 1899-1915, Jul. 2021.