Research Article
[Retracted] ECC-Based Authenticated Key Exchange Protocol for Fog-Based IoT Networks
| Security attack | LSKE | Proposed scheme |
| Replay attack | ✔ | ✔ | Man-in-the-middle attack | X | ✔ | Insider attack | ✔ | ✔ | Impersonation attack | X | ✔ | Brute force attack | ✔ | ✔ | Offline password guessing attack | ✔ | ✔ | Mutual authentication | X | ✔ | Key exchange | ✔ | ✔ | Fog federation | ✔ | ✔ | Message integrity | X | ✔ | AVISPA verification | ✔ | ✔ |
|
|