Skip to main content

Table 2 Variables and functions

From: A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city

free ch1:channel.

free ch2:channel.

free ch3:channel.

type user.

type sensor.

type GWN.

free ui:user.

free sj:sensor.

free gwn:GWN.

free UIDi:bitstring.

free UPWDi:bitstring.

free BIOi:bitstring.

free Sg:bitstring[private].

free PKg:bitstring.

free GWNPSj:bitstring[private].

free SIDj:bitstring.

free SKus:bitstring[private].

free SKsu:bitstring[private].

(*fun hash*)

fun hash(bitstring):bitstring.

(*encrpt and dencrpt*)

fun E(bitstring,bitstring):bitstring.

fun D(bitstring,bitstring):bitstring.

(*BioHash*)

fun gen(bitstring):bitstring.

fun Rep(bitstring,bitstring):bitstring.

(*XOR operation*)

fun XOR(bitstring,bitstring):bitstring.

equation forall m:bitstring,n:bitstring;XOR(XOR(m,n),n)=m.

(*Diffie-Hellman fun*)

fun G(bitstring):bitstring.

fun GK(bitstring,bitstring):bitstring.

(*concatenation operation*)

fun concat(bitstring,bitstring):bitstring.

Â