Research Article
A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things
| Notations | Description |
| | User | | Adversary | | sensor node | | Gateway node | | Unique identity of | | Password of | | Biometric information of | | Unique identity of | | Session key | | ’s secret parameter | , , , | Timestamp | | Hash function | | Concatenation | | XOR operation | | The generator point on the curve | , | Fuzzy extractor algorithm for reproduction and generation | | Reproduction parameter of fuzzy extractor algorithm | | Biometric key of fuzzy extractor algorithm | | The transmission delay time |
|
|