Furthermore, we simulate our scheme for the formal security analysis using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, and show that our scheme is secure against passive and active attacks including the replay and man-in-the-middle attacks.
More
security functionalities along with reduced computational costs for the mobile users make our scheme
more appropriate for the practical applications as compared to Tsai–Lo’s scheme and other related
schemes. Finally, to demonstrate the practicality of the scheme, we evaluate the proposed scheme using
the broadly-accepted NS-2 network simulator.