Research Article

An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure

Table 1

Common notations.

NotationDescription

th remote user of the system
’s identity
’s tamper proof on-board memory/storage
Gateway node
’s identity
’s secret key
’s public key
An elliptic curve
Base-point of elliptic curve
One-way function
XoR operator
Concatenation operator
Secure channel
Public channel
Adversary