IoT Use Cases and Implementations | part of IoT Security: Advances in Authentication | Wiley Telecom books | IEEE Xplore