Certainly, here are the key contributions of this research in concise bullet points.1
References
1Abid K, Pathak NK. Adaptive Random Mac Strategy for IoT Security Through Network Forensics Investigation. Journal of Electrical Systems. 20(7s):1740-1748. doi:10.52783/jes.3774