To provide message authenticity in IoT, we employ a speculation procedure for predicting future message values to achieve an advantageous trade-off between the cryptographic strength and the latency in processing of the message authentication codes.
To provide message authenticity in IoT, we enable the verifier to achieve an advantageous trade-off between the cryptographic strength and the latency in processing of the message authentication codes.