A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks
Table 2
Simulation of query.
On a query , assuming that is a normal state, we perform the following operations. Select ,, and compute ,,,,. Then, the query is answered by .
On a query and assume that is a normal state to perform the following operations. Compute ,,,, , and check . If equal, select ,, and compute ,,,. Then, the query is answered by .
On a query , assuming that is a normal state, do the following. Compute , check . If equal, select ,, and compute ,,. Then, the query is answered by .
On a query and assume that is a normal state to perform the following operations. Compute , and check . If equal, select , and compute . Then, the query is answered by .
On a query, assuming that is a normal state, we perform the following operations. Compute ,,,, the instance checks ; if not equal, it will be terminated. Otherwise, compute . Finally, the user instance accepts and terminates.