I. Introduction
Establishing whether a received message truly comes from the legitimate sender or has been forged by an impersonating attacker describes the user authentication problem. If unau-thenticated messages are accepted, several risks might occur that go from denial of service to privacy or the loss of control of devices, e.g., in Internet of Things (IoT) contexts.