Research Article

A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks

Figure 3

The authentication and key exchange phase.