Research Article

Cluster-Based Authentication Process in a Smart City

Figure 9

Simulation result of the protocol in Table 7 using Scyther verifies secrecy.