Research Article

A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things

Table 1

Notations.

NotationsDescription

User
Adversary
sensor node
Gateway node
Unique identity of
Password of
Biometric information of
Unique identity of
Session key
’s secret parameter
, , , Timestamp
Hash function
Concatenation
XOR operation
The generator point on the curve
, Fuzzy extractor algorithm for reproduction and generation
Reproduction parameter of fuzzy extractor algorithm
Biometric key of fuzzy extractor algorithm
The transmission delay time