Fig. 2From: Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architectureNew registration of \(U_i\)Back to article page