Research Article

An Efficient ECC-Based Authentication Scheme against Clock Asynchronous for Spatial Information Network

Figure 2

Attack path under the Dolev-Yao model using Scyther. (a) Path of authenticating . (b) Path of authenticating .
(a)
(b)