Table 1.
Notation.
IDi, pwi | Identity and password pair of user Ui |
SIDj | Identity of sensor node Sj |
IDs | Identity of smart card |
K | Secret key only know to GWN |
xs | Secret value of GWN and Sj |
KS | Session key |
RNi, RNj, RNG | Random numbers selected by Ui, Sj and GWN, respectively |
Ti, Ti′, Tj, TG, TG′ | The timestamp values |
h(·) | A collision free one-way hash function |
f(x, k) | Pseudo-random function of variable x with key k |
A →B:M | A sends message M to B through a common channel. |
A ⇒ B:M | A sends message M to B through a secure channel |
⊕ | The exclusive-or (XOR) operation. |
M1||M2 | Message M1 concatenates to message M2. |