Research Article

Scrutinizing the Vulnerability of Ephemeral Diffie–Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches

Table 4

Security property satisfaction.

No.Security propertiesAsymmetric-key optionSymmetric-key option

SP1Mutual authenticationXX
SP2Secure key exchangeXX
SP3Perfect forward secrecy
SP4ConfidentialityXX
SP5IntegrityXX
SP6AnonymityXX