Abstract: Existing Authentication and Key Agreement (AKA) protocols for the Internet of Things (IoT) either incur excessive communication and computation overhead, making them unsuitable for ...