Research Article

Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things

Figure 4

Login and authentication phase.