“…Due to the nature of this network, it is complicated to adapt existing infrastructures and protocols with the new features. These restrictions must be considered while designing IoT solutions and security protocols [18,19] The first authentication version of [11] is based on four exchanges of association and authentication messages. The protocol switches from a traditional authentication based on exchanging messages between the Device and the Gateway (ID and password) to a new protocol that includes another message based on a two-entry Fotp function.…”