1. Zhang G, Parashar M (2004) Context-aware dynamic access control for pervasive applications. In: Proceedings of the communication networks and distributed systems modelling and simulation conference, pp 21–30
2. Hong JI, Landay JA (2001) An infrastructure approach to context-aware computing. Human-Comput Interact 16(2–4):287–303
3. Icons used in Fig. 1 and Fig. 2 viz: truck, CT-scan, gate, hospital building and server made by https://www.flaticon.com/authors/smashicons. Last Accessed 19 May 2021
4. Malek B, Miri A, Karmouch A (2008) A framework for context-aware authentication. In: 4th International conference on intelligent environments, pp 1–8
5. Thaker R, Yusera Farooq Khan YF, Mughal S (2018) Fog approach in the internet of things: a review. IJSRCSEIT, 4(1b)