“…Many applications provide identity, authentication, and authorization across multiple contexts for IoT scenarios [ 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 ], and different authors present many taxonomies. Shubham Agrawal et al [ 24 ] claim that there are different authentication schemes, named: OTP, Zero-Knowledge proof, Mutual Authentication, Public Key Cryptography, and Digital Signature.…”