Research Article

Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things

Figure 1

Network model.