Mutual authentication and key agreement. A mutual authentication is performed between the meter(SMIDj ) and NAN gateway (NID). The NAN gateway authenticates SM Fig. 8. Experimental Setting. Execution time (in ms) j Point multiplication Encryption Decryption Hash MAC time 2,900 3.8 41.1 39 8.6 by checking SMI∗D = SMIDj , refers step B in Section III-3. Similarly, the SM authenticates to NAN gateway by checking NI∗D = NID, thus, the proposed LAKA maintains mutual trust between the legitimate parties. Moreover, after idSTj for own purpose. In our scheme, when a smart meter performing mutual trust for each session, LAKA establishes a session key (SK). This session key agreement (SK) can provide subsequent secure communication to involved entities.
Appears in 3 contracts
Samples: Lightweight Authentication and Key Agreement, Lightweight Authentication and Key Agreement, Repository License Agreement
Mutual authentication and key agreement. A mutual authentication is performed between the meter(SMIDj ) and NAN gateway (NID). The NAN gateway authenticates SM Fig. 8. Experimental Setting. Execution time EXECUTION TIME (in ms) j Point multiplication Encryption Decryption Hash MAC time 2,900 3.8 41.1 39 8.6 by checking SMI∗D = SMIDj , refers step B in Section III-3. Similarly, the SM authenticates to NAN gateway by checking NI∗D = NID, thus, the proposed LAKA maintains mutual trust between the legitimate parties. Moreover, after idSTj for own purpose. In our scheme, when a smart meter performing mutual trust for each session, LAKA establishes a session key (SK). This session key agreement (SK) can provide subsequent secure communication to involved entities.
Appears in 1 contract