Skip to main content

Table 4 The notations of BAN logic

From: SD2PA: a fully safe driving and privacy-preserving authentication scheme for VANETs

The notations Meaning
\( \rho , \varrho \) The main participants in the model
\( X_{m} \) Messages
\( K \) A secret key
\( \rho | \equiv \varrho \) \( \rho \) believes \( \varrho \)
\( \rho \triangleleft X_{m} \) \( \rho \) sees \( X_{m} \)
\( \rho |\sim X_{m} \) \( \rho \) sent \( X_{m} \)
\( \# \left( {X_{m} } \right) \) The message \( X_{m} \) is fresh
\( \rho \mathop \leftrightarrow \limits^{K} \varrho \) \( \rho \) and \( \varrho \) communicate by \( K \)
\( \rho \Rightarrow \varrho \) \( \rho \) is able to control \( \varrho \)
\( \left( {X_{m} } \right)_{K} \) The message \( X_{m} \) is hashed by \( K \)