Page 81 - IJEEE-2022-Vol18-ISSUE-1
P. 81

Hamed & Yassin                                                                                                   | 77

       Fig. 8: Healthcare phase that cannot be attacked.        Fig.10: Model checking of the healthcare phase.

     Figure 9 demonstrates the result of a safe system without
faultless cryptographic mechanisms. As a result, this method
becomes subject to malicious assaults and is rendered
unsecure (see Figure 10).

Fig. 9: Healthcare phase that can be attacked.

                                                                Fig. 11: The Proposed Scheme In SPDL-Scyther
   76   77   78   79   80   81   82   83   84   85   86