Research Article

[Retracted] A Novel Variable Pseudonym Scheme for Preserving Privacy User Location in 5G Networks

Algorithm 5

5G security and privacy.
(1)new VRNT1a: bitstring; new VRNT2a: bitstring;
(2)new VRNT1b: bitstring; new VRNT2b:
(3) bitstring;
(4)  (
(5)   !MS (A, choice[VRNT1a, VRNT1b]) |
(6)    !MS (B, choice[VRNT1b, VRNT1a]) |
(7)  !SN (choice[A, B]))
(8)-- Observational equivalence
(9)Initial clauses:
(10) Clause 0: v_31 <> true && attacker2(v_31, true)
(11)  && attacker2(@ mayfail_32, @ mayfail_33) ->
(12)   attacker2(false, @mayfail_33)
(13)(The attacker applies function &&.)
(14) Clause 1: v_37 <> true && attacker2(true, v_37)
(15)  && attacker2(@mayfail_36, @mayfail_38) ->
(16)   attacker2(@mayfail_36, false)
(17)(The attacker applies function &&.)
(18) RESULT Observational equivalence is true (bad
(19)not derivable).