Gateway node impersonation attack
In our protocol, the gateway transmits two messages: {SIDk, A4i, A5i, A6i} and {A4i, A7i, A8i} to the sensor and user, respec- tively. Using these messages, both the sensor and user authenti- cate the gateway for its legitimacy. We assume that the attacker can intercept both the messages.