Informal Security Analysis. It is proved in this section that the proposed protocol provides security measures for D2D key agreement protocol. Table 4 compares the proposed protocol with other existing protocols in features and resisting known attacks.
Appears in 2 contracts
Sources: Research Article, Research Article