Research Article

An Efficient ECC-Based Authentication Scheme against Clock Asynchronous for Spatial Information Network

Figure 8

Simulation results of the Scyther tool. (a) Message reachability analysis report of our protocol. (b) SK confidentiality analysis report of our protocol.
(a)
(b)