Research Article

Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol

Figure 18

Substitution transition A_HashTo_B internal model.