Research Article

Security and Privacy for Edge-Assisted Internet of Things Security Proof for the SKKE Protocol

Figure 2

The SKKE protocol (H, hash function MAC, HMAC function; ||, concatenation; 0x, hexadecimal).