Research Article

Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things

Table 1

Notations and symbols definition.

NotationsDescriptions

The th user
The th sensor
’s identity, password
The gateway
’s identity
Shared private keys between the user and gateway
Public key of GWN
GWN private keys
Private keys of
New temporary identity of
()Hash function
Bitwise XOR operation
Concatenate operations
Symmetric encryption/decryption
Public communication channels
Adversary
Session key