Figure 2From: A secure user authentication protocol for sensor network in data capturingLogin phase and authentication phase.Back to article page