Research Article

Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol

Table 6

Security comparison between the original protocol and the improved protocol.

AgreementMalicious instructionTamper attackReplay attacksMutual authenticationForward safety

LonTalk×××××
LonTalk-SA