Return to Article Details An Analysis of Location-Based Techniques of Authentication for Internet of Things Download Download PDF