Research Article

A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks

Table 2

Simulation of query.

On a query , assuming that is a normal state, we perform the following operations. Select , , and compute , , , , . Then, the query is answered by .

On a query and assume that is a normal state to perform the following operations. Compute ,,,, , and check . If equal, select , , and compute ,,,. Then, the query is answered by .

On a query , assuming that is a normal state, do the following. Compute , check . If equal, select , , and compute ,,. Then, the query is answered by .

On a query and assume that is a normal state to perform the following operations. Compute , and check . If equal, select , and compute . Then, the query is answered by .

On a query, assuming that is a normal state, we perform the following operations. Compute ,,,, the instance checks ; if not equal, it will be terminated. Otherwise, compute . Finally, the user instance accepts and terminates.