Skip to main content
. 2020 Sep 17;181:107558. doi: 10.1016/j.comnet.2020.107558

Table 7.

Security goals deduction of the improved protocol.

DN GMA UR DD GN
D1 A1 F1 Rj|(N1R,IDti,N1t,IDSt,Kt)
D2 A2, A12, A13, A14 P2 Rj(N1R,IDti,N1t,IDSt,Kt)
D3 D1,D2 F10 Rj|MAC(N1R,IDti,N1t,IDSt,Kt)
D4 IM1, D3, A10, D1 I3 Rj|Ti|MAC(N1R,IDti,N1t,IDSt,Kt) G1
D5 A7 F1 Ti|(N2R,N1t,N1R,IDSt,Kt)
D6 A8, A15, A16, A17 P2 Ti(N2R,N1t,N1R,IDSt,Kt)
D7 D5,D6 F10 Ti|MAC(N2R,N1t,N1R,IDSt,Kt)
D8 IM2, D7, A11, D5 I3 Ti|Rj|MAC(N2R,N1t,N1R,IDSt,Kt) G2