Research Article

A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth

Table 2

Symbols used in the PriAuth.

SymbolsMeaning

Gateway node
The th user
The th sensor node
The th user’s identity
The th sensor’s identity
String connector, connect two strings together
XOR operation
’s secret value, master key
Shared key between and
The private key and public key of
The generator of ECC
, Shared key between user and
, Timestamp
Hash function