Research Article

A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols

Figure 14

An example protocol that suffers both replay attack and lack of key confirmation. (a) A vulnerable security protocol. (b) Replay attack against the protocol.
(a)
(b)