Research Article

Scrutinizing the Vulnerability of Ephemeral Diffie–Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches

Figure 9

Verification result of the asymmetric-key option of EDHOC protocol.