Common use of Mutual authentication and key agreement Clause in Contracts

Mutual authentication and key agreement. A mutual authentication is performed between the meter(SMIDj ) and NAN gateway (NID). The NAN gateway authenticates SM Fig. 8. Experimental Setting. TABLE III Execution time (in ms) j Point multiplication Encryption Decryption Hash MAC time 2,900 3.8 41.1 39 8.6 by checking SMI∗D = SMIDj , refers step B in Section III-3. Similarly, the SM authenticates to NAN gateway by checking NI∗D = NID, thus, the proposed LAKA maintains mutual trust between the legitimate parties. Moreover, after idSTj for own purpose. In our scheme, when a smart meter performing mutual trust for each session, LAKA establishes a session key (SK). This session key agreement (SK) can provide subsequent secure communication to involved entities.

Appears in 3 contracts

Samples: Authentication and Key Agreement, Authentication and Key Agreement, cronfa.swan.ac.uk

AutoNDA by SimpleDocs

Mutual authentication and key agreement. A mutual authentication is performed between the meter(SMIDj ) and NAN gateway (NID). The NAN gateway authenticates SM Fig. 8. Experimental Setting. TABLE III Execution time EXECUTION TIME (in ms) j Point multiplication Encryption Decryption Hash MAC time 2,900 3.8 41.1 39 8.6 by checking SMI∗D = SMIDj , refers step B in Section III-3. Similarly, the SM authenticates to NAN gateway by checking NI∗D = NID, thus, the proposed LAKA maintains mutual trust between the legitimate parties. Moreover, after idSTj for own purpose. In our scheme, when a smart meter performing mutual trust for each session, LAKA establishes a session key (SK). This session key agreement (SK) can provide subsequent secure communication to involved entities.

Appears in 2 contracts

Samples: Authentication and Key Agreement, Authentication and Key Agreement

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.