Return to Article Details Hash-chain-based authentication for IoT Download Download PDF