Research Article
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks
Table 1
Notations and abbreviations.
| Symbol | Description |
| | user | | remote sensor node | GWN | gateway node | | malicious attacker | , | identity of and | | password of | | the secret key of gateway node GWN | | a smart card | | the XOR operation | | the concatenation operation | | one-way hash function | | the public channel | | the secure channel |
|
|