Research Article
Scrutinizing the Vulnerability of Ephemeral Diffie–Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches
Table 4
Security property satisfaction.
| No. | Security properties | Asymmetric-key option | Symmetric-key option |
| SP1 | Mutual authentication | X | X | SP2 | Secure key exchange | X | X | SP3 | Perfect forward secrecy | ✓ | ✓ | SP4 | Confidentiality | X | X | SP5 | Integrity | X | X | SP6 | Anonymity | X | X |
|
|