Research Article
Cryptanalysis and Enhancement of an Authenticated Key Agreement Protocol for Dew-Assisted IoT Systems
Table 2
Notations applied in SMDAS protocol.
| Parameters | Description |
| | The cloud/fog server | | The sensor node | | The dew server | | The identity of , , respectively | S | The secret key of | | The password of sensor node | | Timestamp generated by , , respectively | h( ) | One-way hash function defined from to | | The adversary |
|
|