Extending Formal Analysis of Mobile Device Authentication
نویسندگان
چکیده
Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications must rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. Much of the focus in development of new applications in this area seeks to reduce or eliminate the impact of this additional requirement. However, no formal analysis has been conducted to determine whether outof-band channels are actually necessary, or more importantly, whether the protocols used to establish ad-hoc communication can be proven secure. We seek to answer these questions through formal analysis of authentication protocols in mobile device applications. Specifically, we use BAN logic to show that device authentication using a single channel is not possible, and propose a BAN logic extension to help prove correct existing authentication protocols. We demonstrate our analysis by applying our extensions to existing mobile device authentication applications.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملFormal Analysis of Authentication in Bluetooth Device Pairing
Bluetooth is a popular standard for short-range wireless communications. Bluetooth device pairing enables two mobile devices to authenticate each other and establish a secure wireless connection. We present a formal analysis of authentication properties of Bluetooth device pairing. Using the ProVerif cryptographic protocol verifier, we first analyze the standard device pairing protocol specifie...
متن کاملFormal analysis of card-based payment systems in mobile devices
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCard Secure Code. The protocols use pre-registered passwords to provide card holder authentication and Secure Socket Layer/ Transport Layer Security (SSL/TLS) for data confidentiality...
متن کاملOn the security analysis of authenticated group key exchange protocols for low-power mobile devices
Secure communications are paramount in today’s wireless network system, where highly sensitive information is delivered through mobile applications. Cryptographic protocols are used to provide security services, such as confidentiality, authentication and non-repudiation. The design of secure group key exchange protocols is one of many important security issues in wireless networks. Recently, B...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Internet Serv. Inf. Secur.
دوره 1 شماره
صفحات -
تاریخ انتشار 2011