Research Article

[Retracted] A Novel Variable Pseudonym Scheme for Preserving Privacy User Location in 5G Networks

Table 3

V-RNTI verification.

(events )( queries )

event eNB()
event UE()
query attacker (V-RNTI).
query attacker (V-RNTI).
event end().query inj-event (eNB ())==>
inj-event(UE()).
query inj-event (end ())==>
inj-event(UE()).