From: A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT
SA | System administrator |
GW | Gateway |
HG | Home gateway |
FG | Foreign gateway |
Ui | The user i |
Sj | The sensor j |
IDx | The identity of the participant x |
PWi | The password of user i |
\({TID}_{U_i}\) | The temporary pseudo identity of user i |
Rx | A secret integer randomly chosen by user x |
Xx | The secret key of the participant x |
Tk | The timestamp with the order k |
∆T | The valid time interval of transmitting a timestamp |
h(∙) | A secure one-way hash function such as MD5 or SHA-2 [16] |
‖ | The concatenation operation |
⊕ | The exclusive-or (XOR) operation |
Kxy | The symmetric key [16] negotiated by x and y |
\({E}_{K_{xy}}\left(\bullet \right)\) | The symmetric encryption function using Kxy [16] |
\({D}_{K_{xy}}\left(\bullet \right)\) | The symmetric decryption function using Kxy [16] |
DATA | The data collected by sensors |
EDATA | The encryption data |
A = ?B | The expression of “if A is equal to B or not” |