Write two pages about â€œIoT verificationâ€ using the following two references, you must focus on IoT verification and you must use the provided sources only:
 N.Saxena,S.Grijalva,andN.S.Chaudhari,â€˜â€˜Authentication protocol for an IoT-enabled LTE network,â€™â€™ ACM Trans. Internet. Technol., vol. 16, no. 4, Dec. 2016, Art. no. 22. doi: 10.1145/2981547.
 X. Li, J. Niu, M. Z. A. Bhuiyan, F. Wu, M. Karuppiah, and S. Kumari, â€˜â€˜A robust ECC-based provable secure authentication pro- tocol with privacy preserving for industrial Internet of Things,â€™â€™ IEEE Trans. Ind. Informat., vol. 14, no. 8, pp. 3599â€“3609, Aug. 2018. doi: 10.1109/TII.2017.2773666.
Write two pages about â€œIoT Physical attacksâ€ using the following two references, you must focus on IoT Physical attacks and you must use the provided sources only:
100: T. H. Lin, C. C. Lee, and C. H. Chang, â€˜â€˜WSN integrated authentication schemes based on Internet of Things,â€™â€™ J. Internet Technol., vol. 19, no. 4, pp. 1043â€“1053, Jul. 2018.
99: N. Nissim, R. Yahalom, and Y. Elovici, â€˜â€˜USB-based attacks,â€™â€™ Com-
put. Secur., vol. 70, pp. 675â€“688, Sep. 2017. doi: 10.1016/j.cose.2017.
** All references are attached