Adversary Modelling: Evaluating the feasibility of symbolic adversary model on smart transport ticketing system

نویسندگان

  • Sheung Chi Chan
  • Keith Mayes
چکیده

Nowadays, smart card has already been adopted in many public transport ticketing system. This make the security and mutual authentication of the card and reader becomes an important factor to consider. In order to prove the security level and the security properties needed in the communication, formal symbolic adversaries modelling approach are analysed and illustrated in this project and a new approach is proposed. The proposed model base on the Process Algebra CSP model with additional consideration on the cryptographic algorithm and the change of the adversary knowledge set. This can give a more thorough analysis and consideration on the whole network environment. Three protocols will be used as the target of illustration for the proposed modelling approach. They include the original MiFare Classic authentication protocol which some other researchers dismantle it in some of the papers. Also, there exists some protocol proposed by other researchers to improve base on the original authentication protocol after the discovery of flaws in the original one. Two of them are chosen in this paper for the illustration. There will be a brief description of those protocols before the illustration of the new approach for modelling. The primary target for the new modelling approach is to consider a complete running network environment of the smart transport ticketing system and hope to have a formal way to study this kind of contactless communication of smart ticketing system protocol implementation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Controller Synthesis for Linear Time-varying Systems with Adversaries

We present a controller synthesis algorithm for a discrete time reach-avoid problem in the presence of adversaries. Our model of the adversary captures typical malicious attacks envisioned on cyber-physical systems such as sensor spoofing, controller corruption, and actuator intrusion. After formulating the problem in a general setting, we present a sound and complete algorithm for the case wit...

متن کامل

A NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA

In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...

متن کامل

Joining Local Knowledge to Communicate Reliably (Extended Abstract)

A fundamental primitive in distributed computing is Reliable Message Transmission (RMT), which refers to the task of correctly sending a message from a party (or player) to another, in a network where some intermediate relays might be controlled by an adversary. We address the problem under the realistic assumption that the topological knowledge of players is restricted to a certain subgraph an...

متن کامل

On the Exact Success Rate of Side Channel Analysis in the Gaussian Model

Nowadays, Side Channel Analysis is one of the most powerful cryptanalytic technique against cryptosystems embedded in portable devices such as smart cards. Faced with this threat, it is of crucial importance to precisely determine what is achievable by a given side channel adversary against a cryptosystem producing a given side channel leakage. This can be answered by evaluating the success rat...

متن کامل

Cryptanalysis of Two RFID Authentication Protocols

Radio frequency identification (RFID) technologies have many advantages in applications such as object tracking and monitoring, ticketing, supply-chain management, contactless payment systems. However, the RFID system may bring about various security and privacy problems. In this paper we present our security analysis of the LAK protocol and the CWH protocol. First, we show that the LAK protoco...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015