Therefore, with the mechanisms of using the public key scheme on the randomly generated message as the fingerprint, the abuse of proxy credentials by a third party as well as a fake master or slave node of a fraudulent party is prevented. The MITM attack against Phase II and Phase IV is affectless.