Fig. 3From: Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architectureNew login and authentication phaseBack to article page