Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Secondary Authentication Method Suitable for 5G-Based Power Terminals and Formal Analysis
In the 5G network, the access method of IoT terminals is mainly wireless access. Aiming at the high authentication cost in massive access scenarios, this paper proposes a secondary authentication method based ...