Research Article
Formal Security Evaluation and Improvement of Wireless HART Protocol in Industrial Wireless Network
Table 5
Comparison of protocol security analysis methods.
| Scheme | Multiscenario attack | Specific attack | Standard itself | Improvement advice | State space | Smart selective attacks |
| Reference [12] | | √ | | | | | Reference [13] | √ | | | √ | | √ | Reference [8] | | √ | | | | √ | Reference [21] | | √ | | √ | | | Reference [22] | | | √ | √ | | | Our scheme | √ | √ | √ | √ | √ | √ |
|
|