Research Article
Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation
Table 1
Parameters used in the protocol.
| Symbol | Description |
| | Patient or device , where | | Large public prime numbers | | A finite field of order /prime field of order | | Elliptic curve over | | Group of order | | A subgroup of of order | | Point generator of ; | | Random polynomial; | | Master private key | | Master public key | | Private key of device | | Public key of device | | Real identity of entity /temporary identity of entity | | random number generated | | Timestamp generated by entity HSS; | | Temporary identity generation hash function; | | Device’s partial private key generation hash function; | | Symmetric key generation hash function; | | Shamir’s secret hash function | | Local trust level of device | | Local trust secret key | | Secure channel | | Insecure channel |
|
|