Research Article

Cryptanalysis and Enhancement of an Authenticated Key Agreement Protocol for Dew-Assisted IoT Systems

Figure 4

The analysis result by Scyther tool.