Revisiting a Multifactor Authentication Scheme in Industrial IoT
Table 2
Login and authenticated key agreement phase.
Insert to card reader. Input , and . Compute ,,,, and
Check whether . If so, extract . Compute and . Check whether ; if so, generate a random nonce and timestamps . Compute ,, and ,
Check whether . If so, compute , , and Check whether ; if so, generate a timestamp . Compute ,
Check whether , if so, generate a random nonce and timestamps . Calculate, ,,
Check whether ; if so, compute ,, and . Check whether ; if so, return as . Compute ,, and . Generate a temporal identity and timestamp . Compute ,, and .
Compute and . Check if ; if so, compute and
Check whether if so, compute ; check whether ; if so, compute . Check whether ; if so, compute and . Check whether ; if so, the session key is established successfully. Compute . Update with