Research Article
A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks
Table 2
The notations and rules of the BAN logic.
| | Notations | Description |
| | P, Q | A principal | | P ā X | P sees X | | P said X, X was send by P | | P has jurisdiction over X | | k is Pās public key | | k is only known to P and Q. | | #(X) | X is fresh | | <X>k | Formulae X is combined with the formulae k | | {X}k | X is encrypted by the key k | | P has faith in the truth of X | | Rule 1: message meaning rule | or | | Rule 2: nonce verification rule | | | Rule 3: jurisdiction rule | | | Rule 4: decomposition rule | |
|
|