5. Conclusion
In conclusion, in this report, we analyze the remote attestation protocol and successfully built a simulator to analyze the issues of the protocol and vulnerabilities. In our work, we identified that the original protocol was vulnerable to replay attack and man-in-the-middle attack which we presented a formidable solution. However, the modified version is not a complete solution as it doesn't provide protection against more complex attacks such as a combination of DDoS + replay type attacks. In summary, we have done the following: