Fig. 2From: An enhanced state-aware model learning approach for security analysis in lightweight protocol implementationsGeneral negotiation process for IKEv2Back to article page