Research Article

A Secure Distance-Bounding Protocol with Mutual Authentication

Table 2

Notations used in designing our protocol.

NotationsExplanations

Symmetric secret key
Pseudorandom function
Random numbers
Bits
Challenge bit in the th round
Response bit in the th round