Research Article

Cluster-Based Authentication Process in a Smart City

Figure 10

Simulation result of the protocol in Table 8 using AVISPA verifies secrecy and authentication.