Research Article

Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System

Figure 3

The controller node impersonation attack in Wazid et al.’s scheme.