Skip to main content
. 2023 Jun 12;23(12):5518. doi: 10.3390/s23125518

Table 3.

ProVerif security analysis.

Query ProVerif Response
Query inj-event(end_S(IDS[]))
==>inj-event(start_S(IDS[])) Completing…
Starting query inj-event(end_S(IDS[]))
==>inj-event(start_S(IDS[]))
inj-event(end_S(IDS[]))
==>inj-event(start_S(IDS[])) is true.
Query inj-event(end_R(IDR[]))
==>inj-event(start_R(IDR[])) Completing…
Starting query inj-event(end_R(IDR[]))
==>inj-event(start_R(IDR[]))
inj-event(end_S(IDR[]))
==>inj-event(start_S(IDR[])) is true.
Query inj-event(end_T(IDT[]))
==>inj-event(start_T(IDT[])) Completing…
Starting query inj-event(end_T(IDT[]))
==>inj-event(start_T(IDT[]))
inj-event(end_T(IDT[]))
==>inj-event(start_T(IDT[])) is true.
Query not attacker(KNEW[]) Completing…
Starting query not attacker(KNEW[])
not attacker(KNEW[]) is true.