Survey of verification communication protocol security using computational models
Abstract
With the rapid growth of technologies like the Internet of Things (IoT) and social media, securing communication channels against unauthorized access has become a critical priority. Protecting privacy and ensuring secure interactions requires protocols that not only encrypt data during transmission but also verify the identities of all parties involved. This paper examines widely-used computational models that validate the security of such protocols. It provides an overview of these models, their types, and their roles in analyzing and achieving mutual authentication and secure key exchange. By understanding these frameworks, we can better assess how communication protocols resist attacks and maintain confidentiality in dynamic environments.
How to Cite This Article
Sarah Basim Abed, Ghadeer Ibrahim Maki (2025). Survey of verification communication protocol security using computational models . International Journal of Future Engineering Innovations (IJFEI), 2(3), 38-45. DOI: https://doi.org/10.54660/IJFEI.2025.2.3.38-45