Review Article

Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks

Figure 3

Mutual authentication and key agreement phase.