{"id":"https://openalex.org/W3200471776","doi":"https://doi.org/10.1155/2021/7314508","title":"Scrutinizing the Vulnerability of Ephemeral Diffie\u2013Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches","display_name":"Scrutinizing the Vulnerability of Ephemeral Diffie\u2013Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches","publication_year":2021,"publication_date":"2021-09-13","ids":{"openalex":"https://openalex.org/W3200471776","doi":"https://doi.org/10.1155/2021/7314508","mag":"3200471776"},"language":"en","primary_location":{"id":"doi:10.1155/2021/7314508","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/7314508","pdf_url":"https://downloads.hindawi.com/journals/misy/2021/7314508.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/misy/2021/7314508.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100731860","display_name":"Jiyoon Kim","orcid":"https://orcid.org/0000-0003-2710-0864"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jiyoon Kim","raw_affiliation_strings":["Dept. of Information Security Engineering, Soonchunhyang University, Asan 31538, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0003-2710-0864","affiliations":[{"raw_affiliation_string":"Dept. of Information Security Engineering, Soonchunhyang University, Asan 31538, Republic of Korea","institution_ids":["https://openalex.org/I24541011"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025186992","display_name":"Daniel Gerbi Duguma","orcid":"https://orcid.org/0000-0002-7121-4204"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Daniel Gerbi Duguma","raw_affiliation_strings":["Dept. of Information Security Engineering, Soonchunhyang University, Asan 31538, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-7121-4204","affiliations":[{"raw_affiliation_string":"Dept. of Information Security Engineering, Soonchunhyang University, Asan 31538, Republic of Korea","institution_ids":["https://openalex.org/I24541011"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044335939","display_name":"Sangmin Lee","orcid":"https://orcid.org/0000-0002-8609-0785"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sangmin Lee","raw_affiliation_strings":["Dept. of Information Security Engineering, Soonchunhyang University, Asan 31538, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-8609-0785","affiliations":[{"raw_affiliation_string":"Dept. of Information Security Engineering, Soonchunhyang University, Asan 31538, Republic of Korea","institution_ids":["https://openalex.org/I24541011"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089221000","display_name":"Bonam Kim","orcid":"https://orcid.org/0000-0002-8074-4899"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Bonam Kim","raw_affiliation_strings":["Dept. of Information Security Engineering, Soonchunhyang University, Asan 31538, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-8074-4899","affiliations":[{"raw_affiliation_string":"Dept. of Information Security Engineering, Soonchunhyang University, Asan 31538, Republic of Korea","institution_ids":["https://openalex.org/I24541011"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101713123","display_name":"Jae-Deok Lim","orcid":"https://orcid.org/0000-0001-6384-0056"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"JaeDeok Lim","raw_affiliation_strings":["Electronics and Telecommunications Research Institute (ETRI), Daejeon 34129, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0001-6384-0056","affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute (ETRI), Daejeon 34129, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017792460","display_name":"Ilsun You","orcid":"https://orcid.org/0000-0002-0604-3445"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Ilsun You","raw_affiliation_strings":["Dept. of Information Security Engineering, Soonchunhyang University, Asan 31538, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-0604-3445","affiliations":[{"raw_affiliation_string":"Dept. of Information Security Engineering, Soonchunhyang University, Asan 31538, Republic of Korea","institution_ids":["https://openalex.org/I24541011"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5017792460"],"corresponding_institution_ids":["https://openalex.org/I24541011"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.8006,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.7483687,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8538247346878052},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7346000671386719},{"id":"https://openalex.org/keywords/authenticated-key-exchange","display_name":"Authenticated Key Exchange","score":0.6383365392684937},{"id":"https://openalex.org/keywords/ephemeral-key","display_name":"Ephemeral key","score":0.5170617699623108},{"id":"https://openalex.org/keywords/security-association","display_name":"Security association","score":0.4968090355396271},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.48680803179740906},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.47822827100753784},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.47006756067276},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4563378393650055},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.45533129572868347},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.33098500967025757},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2705293893814087},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.23970162868499756},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.20887354016304016},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1675780713558197},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1486051082611084}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8538247346878052},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7346000671386719},{"id":"https://openalex.org/C2777572472","wikidata":"https://www.wikidata.org/wiki/Q4825878","display_name":"Authenticated Key Exchange","level":5,"score":0.6383365392684937},{"id":"https://openalex.org/C76947770","wikidata":"https://www.wikidata.org/wiki/Q4533181","display_name":"Ephemeral key","level":2,"score":0.5170617699623108},{"id":"https://openalex.org/C130881749","wikidata":"https://www.wikidata.org/wiki/Q586894","display_name":"Security association","level":5,"score":0.4968090355396271},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.48680803179740906},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.47822827100753784},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.47006756067276},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4563378393650055},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.45533129572868347},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.33098500967025757},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2705293893814087},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.23970162868499756},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.20887354016304016},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1675780713558197},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1486051082611084},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/7314508","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/7314508","pdf_url":"https://downloads.hindawi.com/journals/misy/2021/7314508.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:296d59841ee54935a804adf2703494c2","is_oa":true,"landing_page_url":"https://doaj.org/article/296d59841ee54935a804adf2703494c2","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mobile Information Systems, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/7314508","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/7314508","pdf_url":"https://downloads.hindawi.com/journals/misy/2021/7314508.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.46000000834465027}],"awards":[{"id":"https://openalex.org/G3918869951","display_name":null,"funder_award_id":"2018-0-00231","funder_id":"https://openalex.org/F4320322030","funder_display_name":"Ministry of Science, ICT and Future Planning"},{"id":"https://openalex.org/G4880814204","display_name":null,"funder_award_id":"2018-0-00231","funder_id":"https://openalex.org/F4320335489","funder_display_name":"Institute for Information and Communications Technology Promotion"},{"id":"https://openalex.org/G6381882780","display_name":null,"funder_award_id":"2018-0-00231","funder_id":"https://openalex.org/F4320321301","funder_display_name":"Soonchunhyang University"}],"funders":[{"id":"https://openalex.org/F4320321301","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10"},{"id":"https://openalex.org/F4320322030","display_name":"Ministry of Science, ICT and Future Planning","ror":"https://ror.org/032e49973"},{"id":"https://openalex.org/F4320324891","display_name":"Iran Telecommunication Research Center","ror":"https://ror.org/01a3g2z22"},{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"},{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3200471776.pdf","grobid_xml":"https://content.openalex.org/works/W3200471776.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W146244851","https://openalex.org/W1488945699","https://openalex.org/W1506423323","https://openalex.org/W1538122200","https://openalex.org/W1573295900","https://openalex.org/W1801505325","https://openalex.org/W1996182770","https://openalex.org/W2009033060","https://openalex.org/W2010939995","https://openalex.org/W2117064875","https://openalex.org/W2119137614","https://openalex.org/W2132544882","https://openalex.org/W2162325770","https://openalex.org/W2234639732","https://openalex.org/W2253199766","https://openalex.org/W2311411768","https://openalex.org/W2476179548","https://openalex.org/W2512955429","https://openalex.org/W2548640435","https://openalex.org/W2795042312","https://openalex.org/W2900676289","https://openalex.org/W2915352631","https://openalex.org/W2997341806","https://openalex.org/W3004171232","https://openalex.org/W3016655233","https://openalex.org/W3045391430","https://openalex.org/W3046579764","https://openalex.org/W3091391092","https://openalex.org/W3108832277","https://openalex.org/W3184376562"],"related_works":["https://openalex.org/W2790635691","https://openalex.org/W4289529909","https://openalex.org/W1979322490","https://openalex.org/W4210648461","https://openalex.org/W2276057896","https://openalex.org/W4285146462","https://openalex.org/W1524452964","https://openalex.org/W2371102389","https://openalex.org/W1921661296","https://openalex.org/W2098450588"],"abstract_inverted_index":{"Most":[0],"existing":[1],"conventional":[2],"security":[3,41,101,106,127,143,154,161,169,201],"mechanisms":[4],"are":[5,44],"insufficient,":[6],"mainly":[7],"attributable":[8],"to":[9,91,137,190],"their":[10],"requirements":[11],"for":[12,24,97,141],"heavy":[13],"processing":[14],"capacity,":[15],"large":[16],"protocol":[17,79,140,158,195],"message":[18],"size,":[19],"and":[20,40,55,75,118,178,188,211],"longer":[21],"round":[22],"trips,":[23],"resource-intensive":[25],"devices":[26,36],"operating":[27],"in":[28,173],"an":[29,71,93],"Internet":[30],"of":[31,46,156,207,218],"Things":[32],"(IoT)":[33],"context.":[34],"These":[35],"necessitate":[37],"efficient":[38],"communication":[39],"protocols":[42],"that":[43],"cognizant":[45],"the":[47,60,139,157,167,205,208],"severe":[48],"resource":[49,176],"restrictions":[50],"regarding":[51],"energy,":[52],"computation,":[53],"communication,":[54],"storage.":[56],"To":[57],"realize":[58],"this,":[59],"IETF":[61],"(Internet":[62],"Engineering":[63],"Task":[64],"Force)":[65],"is":[66,90],"currently":[67],"working":[68],"towards":[69],"standardizing":[70],"ephemeral":[72],"key-based":[73],"lightweight":[74],"authenticated":[76],"key":[77,111],"exchange":[78],"called":[80],"EDHOC":[81,121,194],"(Ephemeral":[82],"Diffie\u2013Hellman":[83],"over":[84],"COSE).":[85],"The":[86],"protocol\u2019s":[87],"primary":[88],"purpose":[89],"build":[92],"OSCORE":[94],"(Object":[95],"Security":[96],"Constrained":[98],"RESTful":[99],"Environments)":[100],"environment":[102],"by":[103],"supplying":[104],"crucial":[105],"properties":[107],"such":[108],"as":[109,216],"secure":[110],"exchange,":[112],"mutual":[113],"authentication,":[114],"perfect":[115],"forward":[116,213],"secrecy,":[117],"identity":[119],"protection.":[120],"will":[122],"most":[123],"likely":[124],"dominate":[125],"IoT":[126],"once":[128],"it":[129],"becomes":[130],"a":[131],"standard.":[132],"It":[133],"is,":[134],"therefore,":[135],"imperative":[136],"inspect":[138],"any":[142],"flaw.":[144],"In":[145,181],"this":[146,174],"regard,":[147],"two":[148],"previous":[149],"studies":[150,210],"have":[151],"shown":[152],"different":[153],"vulnerabilities":[155],"using":[159],"formal":[160],"verification":[162],"methods.":[163],"Yet,":[164],"both":[165,193],"missed":[166],"vital":[168],"flaws":[170,202],"we":[171,185,198],"found":[172],"paper:":[175],"exhaustion":[177],"privacy":[179],"attacks.":[180],"finding":[182],"these":[183,200],"vulnerabilities,":[184],"leveraged":[186],"BAN-Logic":[187],"AVISPA":[189],"formally":[191],"verify":[192],"variants.":[196],"Consequently,":[197],"described":[199],"together":[203],"with":[204],"results":[206],"related":[209],"put":[212],"recommended":[214],"solutions":[215],"part":[217],"our":[219],"future":[220],"work.":[221]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
