Research Article

A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks

Table 3

Simulation of ,, and query.

On a query, we use the simulation of Send query to do the following operations: , , , . This query is answered by , , , and .

For a record that appears in the query, return . Otherwise, select an element , add the record to the list, and return .

On a query , and if is accepted, the query is answered by the parameter in the smart card.

On a query, flip a coin to get the result of . If , return ; otherwise, return a string of the same length.