Fig. 1From: Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architectureNew registration of \(S_j\)Back to article page