Skip to main content

Table 2 Variables and functions

From: A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city

free ch1:channel.
free ch2:channel.
free ch3:channel.
type user.
type sensor.
type GWN.
free ui:user.
free sj:sensor.
free gwn:GWN.
free UIDi:bitstring.
free UPWDi:bitstring.
free BIOi:bitstring.
free Sg:bitstring[private].
free PKg:bitstring.
free GWNPSj:bitstring[private].
free SIDj:bitstring.
free SKus:bitstring[private].
free SKsu:bitstring[private].
(*fun hash*)
fun hash(bitstring):bitstring.
(*encrpt and dencrpt*)
fun E(bitstring,bitstring):bitstring.
fun D(bitstring,bitstring):bitstring.
(*BioHash*)
fun gen(bitstring):bitstring.
fun Rep(bitstring,bitstring):bitstring.
(*XOR operation*)
fun XOR(bitstring,bitstring):bitstring.
equation forall m:bitstring,n:bitstring;XOR(XOR(m,n),n)=m.
(*Diffie-Hellman fun*)
fun G(bitstring):bitstring.
fun GK(bitstring,bitstring):bitstring.
(*concatenation operation*)
fun concat(bitstring,bitstring):bitstring.