Send requests. These requests simulate active attacks in which the attacker is able to modify the messages transmitted. The random O oracle, which simulates a device in the system, responds to the attacker with the corresponding message from the key memorandum of understanding. Since there are four communication circuits, five different requests must be defined. Irshad A, Naqvi H, Ashraf Chaudhary S, Usman M, Shafiq M, Mir O, Kanwal A (2018) Cryptanalysis and improvement of a multi-server authenticated key agreement by chen and lee`s scheme. Inform Technol Contr 47 (3):431-446 In this section, we describe the proposed anonymous authenticated key exchange protocol based on the ECC for WSN. The main advantage of ECC is that it offers the same level of security with a smaller key size than other cryptography mechanisms such as RSA. It therefore meets the requirements of the limited nature of WSN`s resources. Our protocol consists of three phases: the configuration phase, the registration phase, the authentication phase and the key exchange phase. The detailed steps for each phase are described below. The symbols used in this article are summarized in Table 1. This section evaluates the robustness of the proposed protocol compared to other schemas [20,21,22,23, 25] based on a multi-server architecture.

The security features and the review of combating many attacks for different schemes are described in Table 2, which, unlike the previous schemes, qualifies the proposed protocol as a highly confirmed key agreement. Table 2 presents the analysis of our associated systems [20,21,22,23, 25]. The analysis allows us to conclude that our protocol is safer than [20,21,22,23, 25]. All of these protocols depend on symmetric hash-based cryptography and others. The exponential exchange of keys in itself does not provide for prior agreement or subsequent authentication between participants. It has therefore been described as an anonymous key memorandum of understanding. The participants in the minutes. Participants in an authentication and key exchange protocol for real-time data search in WSNs include users, a gateway node, and a sensor node. Each user registers for the gateway node, and each sensor node shares a common secret key with the gateway node. Chen, Y., Castillejo, P., López, L., Chen, Y., Martínez, J.

F., Martínez, J. F., et al. (2017). An anonymous authentication and key set-up scheme for Smart Grid: FAuth. Energies, 10 (9), 1354. doi.org/10.3390/en10091354. . . . .