Research Article

Security and Privacy for Edge-Assisted Internet of Things Security Proof for the SKKE Protocol

Figure 6

Game G2 of indistinguishability security of the SKKE protocol.