Table 7 Security analysis for STRIDE and Dolev–Yao models.

From: Intelligent two-phase dual authentication framework for Internet of Medical Things

Model

Attack type

How it was tested

Tools/methods

Framework defense

STRIDE

Spoofing

Simulated identity impersonation

Scapy

Two-phase authentication, ECDH key exchange.

Tampering

Modified messages during transmission

Wireshark

AES-GCM encryption, message integrity checks.

Repudiation

Tested non-repudiation by verifying logs

Log Files

Timestamping, secure logging.

Information disclosure

Intercepted communication to test data leakage

Wireshark

AES-GCM encryption, secure key exchange (ECDH).

DoS

Sent large traffic volume to disrupt services

LOIC

Rate-limiting, message filtering, load balancing.

Privilege escalation

Tested unauthorized privilege access

Metasploit

Continuous device authentication using ECDH.

Information modification

Altered transmitted data

Burp Suite

AES-GCM encryption, integrity check on messages.

Fabrication

Created fake data to simulate the attack

Scapy

Nonces, timestamp validation, session management.

Replay

Sent captured packets to replay communications

Wireshark

ECDH key exchange, two-phase authentication.

Dolev–Yao

Spoofing

Impersonated entities in the communication network

Scapy

AES-GCM encryption, HMAC for integrity.

Tampering

Modified messages during transmission

Wireshark

Timestamping, secure logging.

Repudiation

Tested if the sender could deny sent messages

Log Files

End-to-end AES-GCM encryption, key exchange.

Information disclosure

Intercepted data in-transit

Wireshark

Rate-limiting, load balancing, IP blocking.

DoS

Attacked the network with flooding to test resilience

LOIC

Continuous authentication, ECDH key exchange.

Privilege escalation

Attempted unauthorized privilege escalation

Metasploit

AES-GCM encryption, integrity checks.

Information modification

Modified sensitive data in transit

Burp Suite

Nonces, session tokens, timestamp validation.

Fabrication

Generated fake communication data

Scapy

Nonces, session tokens, timestamp validation.

Replay

Replay old captured packets to simulate the attack

Wireshark

ECDH key exchange, session tokens, timestamp validation.