Implementation
Experiment Results
Limitations
Current implementation is not able to prevent complex attacks such as a combination of replay attacks and DDoS attacks as described below.
Conclusion
In conclusion, in this report, we analyze the remote attestation protocol and successfully built a simulator to analyze the issues of the protocol and vulnerabilities. In our work, we identified that the original protocol was vulnerable to replay attack and man-in-the-middle attack which we presented a formidable solution. However, the modified version is not a complete solution as it doesn't provide protection against more complex attacks such as a combination of DDoS + replay type attacks.