Fig. 6From: A study on the integrity and authentication of weather observation data using Identity Based EncryptionThe mutual authentication protocol with the data logger and LAU serverBack to article page