Research Article
A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth
Table 2
Symbols used in the PriAuth.
| Symbols | Meaning |
| | Gateway node | | The th user | | The th sensor node | | The th user’s identity | | The th sensor’s identity | ∥ | String connector, connect two strings together | | XOR operation | | ’s secret value, master key | | Shared key between and | | The private key and public key of | | The generator of ECC | , | Shared key between user and | , | Timestamp | | Hash function |
|
|