“…In addition, by applying the hash function again in the received password verifier H n-i (P), If H(H n-i (P)) and the value H ni+1 (P) value of the two values compared to the values that match, destination node is to certify that the source node is to know the password correctly. If the source node and destination node perform a legal authentication process, destination node is stored in the directory and replace it with a password verifier H n-i (P) of source node [12].…”