4. Evaluation

For our evaluation, we used the TPM simulator provided by Microsoft and conducted few security attacks to analyze the behavior of the protocol for the following threat models.
Replay Attack:  an attack on a security protocol using a replay of messages from a different context intended to fool the honest participant into thinking they have successfully completed the protocol run \cite{articlea}. In our context consider a passive attacker listening at the network who can capture valid authentication sequence packets and later replay these packets to disguise as the previous user to the remote system. 
Man in the middle Attack:  an attack when an adversary secretly alters and relays the communication between two parties. In our context, the communication between two hosts is intercepted by an intermediate user by which he can collect confidential information and forge authentic messages to manipulate the communication. 
Denial of Service Attack: an attack where the perpetrator seeks to make the system or network unavailable to its legitimate intended users by temporarily or indefinitely disrupting services of the targeted host. In our context, a denial of service can be executed to attack the trusted computing platform to make it unavailable for a certain time.