Research Article

Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol

Figure 19

Substitution transition B_HashTo_A internal model.