Research Article
Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things
Table 1
Notations and symbols definition.
| Notations | Descriptions |
| | The th user | | The th sensor | | ’s identity, password | | The gateway | | ’s identity | | Shared private keys between the user and gateway | | Public key of GWN | | GWN private keys | | Private keys of | | New temporary identity of | () | Hash function | | Bitwise XOR operation | | Concatenate operations | | Symmetric encryption/decryption | | Public communication channels | | Adversary | | Session key |
|
|