Research Article

An Improved Blockchain-Based Authentication Protocol for IoT Network Management

Table 2

Claim events which defined in the Scyther tool.

ClaimDescription

There is no unauthorized access to the parameters transmitted in the protocol. For example, means that the value of remains confidential in the sense of initiator, and the third party has not been able to access it.
means that is always on the line and is linked to . In fact, the presence and survival of are requested by .
It ensures that the receiver has received message at the time that was sent by the sender. There is no agreement on the data transmitted.
claims that the agreed values between the receiver and the transmitter will remain unchanged.
claims that each message sent by the sender corresponds to receiving the message by the receiver, and all the steps are executed correctly and without interruption.