Research Article
A Cost Effective Identity-Based Authentication Scheme for Internet of Things-Enabled Agriculture
Table 1
Notations used in the proposed algorithm.
| S.no | Notation | Explanation |
| 1 | PKG | Private key generator | 2 | | Hash function | 3 | | Divisor of hyperelliptic curve | 4 | | Private key of PKG | 5 | | Public key of PKG | 6 | | Private key of the device | 7 | | Public key of the device | 8 | | Randomly selected private number | 9 | | Secret keys | 10 | | Signature |
|
|