Research Article

Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation

Table 1

Parameters used in the protocol.

SymbolDescription

Patient or device , where
Large public prime numbers
A finite field of order /prime field of order
Elliptic curve over
Group of order
A subgroup of of order
Point generator of ;
Random polynomial;
Master private key
Master public key
Private key of device
Public key of device
Real identity of entity /temporary identity of entity
random number generated
Timestamp generated by entity HSS;
Temporary identity generation hash function;
Device’s partial private key generation hash function;
Symmetric key generation hash function;
Shamir’s secret hash function
Local trust level of device
Local trust secret key
Secure channel
Insecure channel