“…Medicine & health [81,82,85,90,91,[96][97][98]] Fog, edge, or cloud computing [100][101][102][103] Vehicular [130,131,134] Drones [135,136,140] Industrial [105,106,109,137,138] Multidomain [110,112,116,117,[121][122][123][124][126][127][128][129] Table 4 shows the attacks against which the described protocols for IoT are resistant. The table contains only those protocols for which the authors conducted formal and informal security evidence and indicated which attacks their proposed protocol is resistant to.…”