Research Article

Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol

Figure 8

Attacker model of LonTalk protocol authentication.