Fig. 7From: An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architectureSimulation results of the Scyther tool. Figure includes two pictures. The a shows the attack path of the Scyther tool’s formal analysis under the Dolev–Yao model for our protocol. The reachability analysis report of our protocol messages is presented (b)Back to article page