Research Article
A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks
Table 1
Notations and descriptions.
| Notations | Description |
| | The vehicle end user | | The roadside unit | | The cloud server | | ’s identity | | ’s password | | | | Biometric features of | | Generation/reproduction process of fuzzy extractor | | The secret key of | | The pseudoidentities of | | | | Session key | | The attacker | | One-way hash function | | Concatenation | | The exclusive-or operation with x and y |
|
|