Table 10 Output of formal analysis by using ProVerif tool.

From: Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks

Query 1

Attacker (Key/Data) (confidentiality of Key/Data)

Result

Yes.

Explanation

The key is confidential from the attacker.

Data cannot be intercepted from vulnerable channel

Query 2

Attacker (Data) (confidentiality of Data)

Result

No.

Explanation

Data can be intercepted from vulnerable channel

Query 3

Injective correspondence on Request -> Response (authentication)

Result

Yes.

Explanation

The response has a corresponding legitimate request, ensuring data authenticity by using highly secure protocol.