“…On the other hand, as it could be implemented on a MCRN, it is sensitive to PUEA and in works as [36] systems were developed to detect PUEA in IoT, and as a future work, they planned the analysis of the users' mobility which is incorporated in our proposal. For example, in security of IoT-based healthcare, smart building, or big data, the system needs to have scalability, reliability, adaptability, fault tolerance, and interoperability [37][38][39], and in case that a PUEA is successful, MCRN will not have anyone of these. A number of authors propose the use of cryptographic techniques [40], but as usual, the PU protocol cannot be changed by SU, and we proposed not to alter the PU operation.…”