Research Article
A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols
Figure 14
An example protocol that suffers both replay attack and lack of key confirmation. (a) A vulnerable security protocol. (b) Replay attack against the protocol.
(a) |
(b) |