Research Article

Scrutinizing the Vulnerability of Ephemeral Diffie–Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches

Table 2

BAN-Logic notations.

NotationMeaning

R believes that message M is true
R receives message M at any point in time
R previously sent message M
R has jurisdiction over M
M is fresh
S is a secret key shared between M and N
S is R’s public key
S is a secret that R and I share
M is a message encrypted with a key K
M is combined with V