Common use of Clogging attack Clause in Contracts

Clogging attack. The adversary cannot perform clogging attack and waste IoT resources because both agents mutually authenticate each other before sharing a session key. however, ▇▇ et al.’s and ▇▇▇▇▇▇▇▇ et al.’s protocols are insecure against this attack.

Appears in 2 contracts

Sources: Research Article, Research Article