Research Article
Cryptanalysis and Enhancement of an Authenticated Key Agreement Protocol for Dew-Assisted IoT Systems
Table 3
Notations applied in e-SMDAS protocol.
| Parameters | Description | Parameters | Description |
| | The security parameter | | The ephemeral private keys of , , respectively | | The cloud/fog server | | The timestamps | | The sensor node | | One-way hash function defined from to | | The dew server | | One-way hash function defined from to , where is the length of session key | S | The secret key of | | One-way hash function defined from to | | The identity of , , respectively | | The adversary |
|
|