Safe Authentication Protocol for Secure USB Memories
نویسندگان
چکیده
Due to its portability and accesibility, the USB memory has become one of the most popular storage devices. However, if the device is lost, stolen or hacked, it can lead to critical information leakage. It is natural that malicious insiders would try to thieve their colleagues’ USB memories. Consequently, various security-incorporated USB products have been developed. To our best knowledge, there is lack of security analysis and comparison on them. In this paper, we explore the authentication protocols for the secure USB memory while analyzing their vulnerabilities. Also, we classify the vulnerabilities into 12 categories, based on which the protocols are then compared. In addition, some recommendations are given to address the vulnerabilities. It is expected for commercial secure USB products to provide enhanced security after a thorough revise on the authentication protocols of their software based on the introduced vulnerability categorization. Keyword : Authentication protocol, Identification, USB Flash Memory, Reverse engineering
منابع مشابه
HMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملA Security Protocol for the Identification and Data Encrypt Key Management of Secure Mobile Devices
In this paper, we proposed an identification and data encrypt key manage protocol that can be used in some security system based on such secure devices as secure USB memories or RFIDs, which are widely used for identifying persons or other objects recently. In general, the default functions of the security system using a mobile device are the authentication for the owner of the device and secur...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA Secure Data Transfer Algorithm for USB Mass Storage Devices to Protect Documents
The Universal Serial Bus (USB) has become the most popular interface standard for hardware connection, and there has been a huge growth in the number of USB peripheral devices. External USB storage devices, in particular, are the most popular applications in market. Unfortunately, because USB affords high speed data transmission and is extremely convenient to use, many companies have prohibited...
متن کاملDefending against insider threats and internal data leakage
In the last decade, computer science researchers have been working hard to prevent attacks against the security of information systems. Different adversary models have incarnated the malicious entities against which researchers have defined security properties, identified security vulnerabilities, and engineered security defenses. These adversaries were usually intruders, that is, outsiders try...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JoWUA
دوره 1 شماره
صفحات -
تاریخ انتشار 2010