Skip to main content

Table 2 The parameters used in the proposed scheme

From: A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT

SA

System administrator

GW

Gateway

HG

Home gateway

FG

Foreign gateway

Ui

The user i

Sj

The sensor j

IDx

The identity of the participant x

PWi

The password of user i

\({TID}_{U_i}\)

The temporary pseudo identity of user i

Rx

A secret integer randomly chosen by user x

Xx

The secret key of the participant x

Tk

The timestamp with the order k

T

The valid time interval of transmitting a timestamp

h(∙)

A secure one-way hash function such as MD5 or SHA-2 [16]

The concatenation operation

The exclusive-or (XOR) operation

Kxy

The symmetric key [16] negotiated by x and y

\({E}_{K_{xy}}\left(\bullet \right)\)

The symmetric encryption function using Kxy [16]

\({D}_{K_{xy}}\left(\bullet \right)\)

The symmetric decryption function using Kxy [16]

DATA

The data collected by sensors

EDATA

The encryption data

A = ?B

The expression of “if A is equal to B or not”