Research Article

Revisiting a Multifactor Authentication Scheme in Industrial IoT

Table 2

Login and authenticated key agreement phase.


Insert to card reader. Input , and . Compute , , , , and Check whether . If so, extract . Compute and . Check whether ; if so, generate a random nonce and timestamps . Compute , , and , Check whether . If so, compute , , and Check whether ; if so, generate a timestamp . Compute ,
Check whether , if so, generate a random nonce and timestamps . Calculate, , ,
Check whether ; if so, compute , , and . Check whether ; if so, return as . Compute , , and . Generate a temporal identity and timestamp . Compute , , and . Compute and . Check if ; if so, compute and
Check whether if so, compute ; check whether ; if so, compute . Check whether ; if so, compute and . Check whether ; if so, the session key is established successfully. Compute . Update with