Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices

被引:0
|
作者
Lu, Bo [1 ,2 ]
Cao, Ruohan [1 ,3 ]
Lu, Yueming [1 ,3 ]
Luo, Xueting [1 ,2 ]
机构
[1] BUPT, Key Lab Trustworthy Distributed Comp & Serv, Minist Educ, Beijing 100876, Peoples R China
[2] BUPT, Coll Cyberspace Secur, Beijing 100876, Peoples R China
[3] BUPT, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
基金
国家重点研发计划;
关键词
Security protocol; formal analysis; wearable device protocol; scyther; tamarin-prover; KEY AGREEMENT SCHEME; INTERNET; SECURITY;
D O I
10.1109/ACCESS.2019.2927772
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For wearable devices, this paper proposes an authentication protocol eWMDP. We formally model and analyze it. In the execution model of the protocol, a Dolev-Yao adversary is constituted. With the above, various security properties can be defined for measuring security performance. Our protocol can achieve the injective-auth property, in which case it surpasses another existing wearable authentication protocol-WMDP. In addition, our analysis work is confirmed by Scyther and tamain-prover, and the two protocols are implemented on PC and on Ti CC3200 LAUNCHPAD widely used in wearable devices in the meanwhile. The results of experiments highlight the higher transmission efficiency of eWMDP under various configurations, including different platforms, sorts of combinations of encryption algorithms and hash algorithms, and sending packets in different sizes.
引用
收藏
页码:97771 / 97783
页数:13
相关论文
共 50 条
  • [1] Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment
    Das, Ashok Kumar
    Wazid, Mohammad
    Kumar, Neeraj
    Khan, Muhammad Khurram
    Choo, Kim-Kwang Raymond
    Park, YoungHo
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2018, 22 (04) : 1310 - 1322
  • [2] Design and Analysis of Lightweight Authentication Protocol for Securing IoD
    Jan, Saeed Ullah
    Qayum, Fawad
    Khan, Habib Ullah
    IEEE ACCESS, 2021, 9 : 69287 - 69306
  • [3] FORMAL ANALYSIS OF A NOVEL RFID AUTHENTICATION PROTOCOL
    Chikouche, Noureddine
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
  • [4] User centric three-factor authentication protocol for cloud-assisted wearable devices
    Jiang, Qi
    Qian, Yuanyuan
    Ma, Jianfeng
    Ma, Xindi
    Cheng, Qingfeng
    Wei, Fushan
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (06)
  • [5] Formal Analysis and Verification for an Ultralightweight Authentication Protocol RAPP of RFID
    Li, Wei
    Xiao, Meihua
    Li, Yanan
    Mei, Yingtian
    Zhong, Xiaomei
    Tu, Jimin
    THEORETICAL COMPUTER SCIENCE, NCTCS 2017, 2017, 768 : 119 - 132
  • [6] Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
    AL-Saraireh, Ja'afer M.
    Saraireh, Mohammad S.
    Saraireh, Saleh S.
    Al Nabhan, Mohammad M.
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2011, 11 (02): : 86 - 92
  • [7] Lightweight authentication protocols for wearable devices
    Das, Ashok Kumar
    Zeadally, Sherali
    Wazid, Mohammad
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 63 : 196 - 208
  • [8] A lightweight and flexible mutual authentication and key agreement protocol for wearable sensing devices in WBAN
    Thota, Sandeep Kumar Reddy
    Mala, C.
    Krishnan, Geetha
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2024, 20 (04) : 398 - 414
  • [9] A Formal Description and Verification of Authentication Protocol
    Yuan, Zhanting
    Kang, Xu
    Zhang, Qiuyu
    Liang, Shuang
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 735 - 740
  • [10] The yoking-proof-based authentication protocol for cloud-assisted wearable devices
    Liu, Wei
    Liu, Hong
    Wan, Yueliang
    Kong, Huafeng
    Ning, Huansheng
    PERSONAL AND UBIQUITOUS COMPUTING, 2016, 20 (03) : 469 - 479