Assist with the implementation of proposed authentication protocols. Design and implement light-weight configurable authentication protocols for the Internet of Things (IoT) devices. Capture and analyze physical characteristics of the IoT devices for two authentication protocols. Develop device-specific profiles which hence used as a second-factor authentication method and collects data.