Secure control protocol for universal serial bus mass storage devices

被引:6
作者
Wei, Jianghong [1 ]
Liu, Wenfen [1 ]
Hu, Xuexian [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou, Peoples R China
关键词
field buses; cryptography; authorisation; secure control protocol; universal serial bus mass storage devices; transmission speed; plug-and-play; hot swapping; interface standard; peripheral connections; malicious user; confidential file extraction; computer systems; USB ports; potential security risk control; USB interface; workplace corporations; commercial corporations; USB storage devices; mutual authentication; transferred file encryption; AUTHENTICATION;
D O I
10.1049/iet-cdt.2014.0196
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The universal serial bus (USB) has some advantages like high transmission speed, plug-and-play and hot swapping, and has become the most popular interface standard for peripheral connections. However, such features also make it easier for a malicious user to extract confidential files from computer systems via USB ports. Consequently, to control the potential security risks of USB interface, many workplace and commercial corporations have directly forbidden their employees from using USB devices. To provide a flexible way of using USB without compromising security, this study proposes a novel secure control protocol for USB storage devices. The device and the server are required to complete mutual authentication and establish a session key used to encrypt the transferred files. The details of each phase of the new protocol are given. Security analysis demonstrates that the proposed protocol conquers those security pitfalls existing in the available protocols and can resist various attacks. Performance discussion indicates that the new protocol is also efficient enough for practical applications.
引用
收藏
页码:321 / 327
页数:7
相关论文
共 14 条
[1]  
Chatterjee Kakali, 2013, International Journal of Network Security, V15, P9
[2]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[3]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[4]   Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices [J].
He, Debiao ;
Kumar, Neeraj ;
Lee, Jong-Hyouk ;
Sherratt, R. Simon .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2014, 60 (01) :30-37
[5]   A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems [J].
Huang, Xinyi ;
Xiang, Yang ;
Chonka, Ashley ;
Zhou, Jianying ;
Deng, Robert H. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (08) :1390-1397
[6]   Two efficient two-factor authenticated key exchange protocols in public wireless LANs [J].
Juang, Wen-Shenq ;
Wu, Jing-Lin .
COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) :33-40
[7]  
Lee C.-C., 2013, INT J NETWORK SECURI, V15, P64
[8]   Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices [J].
Lee, Cheng-Chi ;
Chen, Chi-Tung ;
Wu, Ping-Hsien ;
Chen, Te-Yu .
IET COMPUTERS AND DIGITAL TECHNIQUES, 2013, 7 (01) :48-55
[9]   A password authentication scheme over insecure networks [J].
Liao, I-En ;
Lee, Cheng-Chi ;
Hwang, Min-Shiang .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (04) :727-740
[10]   Examining smart-card security under the threat of power analysis attacks [J].
Messerges, TS ;
Dabbish, EA ;
Sloan, RH .
IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (05) :541-552