Research Article

A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks

Table 1

Notations and descriptions.

NotationsDescription

The vehicle end user
The roadside unit
The cloud server
’s identity
’s password
Biometric features of
Generation/reproduction process of fuzzy extractor
The secret key of
The pseudoidentities of
Session key
The attacker
One-way hash function
Concatenation
The exclusive-or operation with x and y