Research Article
Lightweight and Anonymous Mutual Authentication Protocol for Edge IoT Nodes with Physical Unclonable Function
Figure 5
(a) The proof for “ believes that is a good shared key between and ”. (b) The proof for “ believes that is a good shared key between and ”. (c) “ believes that is a good shared key between and ”. (d) “ believes that is a good shared key between and ”. (e) “ believes that is a good shared key between and ”. (f) “ believes that is a good shared key between and ”.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |