Research Article
A Lightweight Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth
Table 1
Symbols used in the PriAuth.
| Symbols | Meaning |
| | Gateway | , | The ith user and his identity | | The jth sensor node and its identity | || | Connects two strings together | | XOR operation | | ’s secret key | | The generator of ECC | | Shared key between and | | Timestamp | | General hash function |
|
|