Correctness. With the formal validation tool ▇▇▇▇▇▇▇-▇▇▇▇▇-▇▇▇▇▇▇▇ Logic (BAN-logic) [27], we provide the proof of correctness of the proposed scheme in this section. Let U be the user, S represent the sensor node and GWN denote the gateway node. We demonstrate that a session key can be created successfully after the process of mutual authentication among S and U. Now, the basic notations of BAN-logic are given below: • P |≡ X: P believes X.
Appears in 2 contracts
Sources: Privacy Preserving Authentication and Key Agreement Scheme, Privacy Preserving Authentication and Key Agreement Scheme