Research Article
An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure
| Notation | Description |
| | th remote user of the system | | ’s identity | | ’s tamper proof on-board memory/storage | | Gateway node | | ’s identity | | ’s secret key | | ’s public key | | An elliptic curve | | Base-point of elliptic curve | | One-way function | | XoR operator | | Concatenation operator | | Secure channel | | Public channel | | Adversary |
|
|