Research Article

Cluster-Based Authentication Process in a Smart City

Figure 8

Simulation result of the protocol in Table 7 using AVISPA verifies secrecy and authentication.