Research Article

Cluster-Based Authentication Process in a Smart City

Figure 11

Simulation result of the protocol in Table 8 using Scyther verifies secrecy.