Research Article

[Retracted] ECC-Based Authenticated Key Exchange Protocol for Fog-Based IoT Networks

Table 8

Security comparison.

Security attackLSKEProposed scheme

Replay attack
Man-in-the-middle attackX
Insider attack
Impersonation attackX
Brute force attack
Offline password guessing attack
Mutual authenticationX
Key exchange
Fog federation
Message integrityX
AVISPA verification