Wireless Communications and Mobile Computing / 2017 / Article / Tab 2

Research Article

A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth

Table 2

Symbols used in the PriAuth.


Gateway node
The th user
The th sensor node
The th user’s identity
The th sensor’s identity
String connector, connect two strings together
XOR operation
’s secret value, master key
Shared key between and
The private key and public key of
The generator of ECC
, Shared key between user and
, Timestamp
Hash function

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.