Research Article

Lightweight and Anonymous Mutual Authentication Protocol for Edge IoT Nodes with Physical Unclonable Function

Figure 5

(a) The proof for “ believes that is a good shared key between and ”. (b) The proof for “ believes that is a good shared key between and ”. (c) “ believes that is a good shared key between and ”. (d) “ believes that is a good shared key between and ”. (e) “ believes that is a good shared key between and ”. (f) “ believes that is a good shared key between and ”.
(a)
(b)
(c)
(d)
(e)
(f)