Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices

被引:0
|
作者
Lu, Bo [1 ,2 ]
Cao, Ruohan [1 ,3 ]
Lu, Yueming [1 ,3 ]
Luo, Xueting [1 ,2 ]
机构
[1] BUPT, Key Lab Trustworthy Distributed Comp & Serv, Minist Educ, Beijing 100876, Peoples R China
[2] BUPT, Coll Cyberspace Secur, Beijing 100876, Peoples R China
[3] BUPT, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
基金
国家重点研发计划;
关键词
Security protocol; formal analysis; wearable device protocol; scyther; tamarin-prover; KEY AGREEMENT SCHEME; INTERNET; SECURITY;
D O I
10.1109/ACCESS.2019.2927772
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For wearable devices, this paper proposes an authentication protocol eWMDP. We formally model and analyze it. In the execution model of the protocol, a Dolev-Yao adversary is constituted. With the above, various security properties can be defined for measuring security performance. Our protocol can achieve the injective-auth property, in which case it surpasses another existing wearable authentication protocol-WMDP. In addition, our analysis work is confirmed by Scyther and tamain-prover, and the two protocols are implemented on PC and on Ti CC3200 LAUNCHPAD widely used in wearable devices in the meanwhile. The results of experiments highlight the higher transmission efficiency of eWMDP under various configurations, including different platforms, sorts of combinations of encryption algorithms and hash algorithms, and sending packets in different sizes.
引用
收藏
页码:97771 / 97783
页数:13
相关论文
共 50 条
  • [21] Formal verification of secondary authentication protocol for 5G secondary authentication
    Edris E.K.K.
    Aiash M.
    Loo J.K.-K.
    Alhakeem M.S.
    International Journal of Security and Networks, 2021, 16 (04): : 223 - 234
  • [22] Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol
    Edris, Ed Kamya Kiyemba
    Aiash, Mandi
    Loo, Jonathan Kok-Keng
    2020 SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2020, : 256 - 261
  • [23] Formal analysis of RFC 8120 authentication protocol for HTTP under different assum ptions ?
    Okumura, Naomi
    Ogata, Kazuhiro
    Shinoda, Yoichi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [24] Design and analysis on trusted network equipment access authentication protocol
    Lai, Yingxu
    Chen, Yinong
    Zou, Qichen
    Liu, Zenghui
    Yang, Zhen
    SIMULATION MODELLING PRACTICE AND THEORY, 2015, 51 : 157 - 169
  • [25] Refillable PUF authentication protocol for constrained devices
    Desuert, Arthur
    Chollet, Stephanie
    Pion, Laurent
    Hely, David
    JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2022, 14 (03) : 195 - 212
  • [26] A novel protocol for efficient authentication in cloud-based IoT devices
    Alam, Irfan
    Kumar, Manoj
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (10) : 13823 - 13843
  • [27] Security Analysis of Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography
    Kordy, Turki
    Noor, Fazal
    Benrhouma, Oussama
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (10): : 91 - 100
  • [28] A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things
    Gupta, Ankur
    Tripathi, Meenakshi
    Muhuri, Samya
    Singal, Gaurav
    Kumar, Neeraj
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 68
  • [29] A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks
    Roy, Kumar Sekhar
    Deb, Subhrajyoti
    Kalita, Hemanta Kumar
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (04) : 989 - 1000
  • [30] Formal Analysis of 5G EAP-TLS Authentication Protocol Using Proverif
    Zhang, Jingjing
    Yang, Lin
    Cao, Weipeng
    Wang, Qiang
    IEEE ACCESS, 2020, 8 : 23674 - 23688