Research Article

A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability

Figure 2

Comparison of the adversary assumption in our scheme and previous schemes [1, 2].