Research Article
A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks
Table 3
Simulation of
,, and
query.
| On a query, we use the simulation of Send query to do the following operations: , , , . This query is answered by , , , and . |
| For a record that appears in the query, return . Otherwise, select an element , add the record to the list, and return . |
| On a query , and if is accepted, the query is answered by the parameter in the smart card. |
| On a query, flip a coin to get the result of . If , return ; otherwise, return a string of the same length. |
|
|