Similar to authentication-by-gateway model,
research [14] has discussed a practical IoT communication example based on CoAP (Constrained Application Protocol) [15] that the resource-constrained objects cooperate with the gateway in UCN (Unconstrained Network) to achieve data authentication.
The pros and cons of authentication-by-gateway scheme are listed below: