“…In general, authentication processes in IoT are challenged by the need for security in information sharing and data transmission [6,28,68], wireless communication [49,51,56,57,62], proximity-based authentication [36], false-positive identification [13], or service operations [38]. Another similar aspect is the ability to resist/detection of evolving cyberattacks [14,15,28,37,41,47,52,53,57,65,66,68], leading to the adoption of fog computing that compliments the needs of IoT [40,72]. From the cybersecurity research perspective, the problem with group key distribution or multiowned devices from an industrial capacity was prevalent [9,16,26,29,31,44,73], as well as an identity-based authentication protocol for IoT [43,60,70,74].…”