Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices

被引:0
|
作者
Lu, Bo [1 ,2 ]
Cao, Ruohan [1 ,3 ]
Lu, Yueming [1 ,3 ]
Luo, Xueting [1 ,2 ]
机构
[1] BUPT, Key Lab Trustworthy Distributed Comp & Serv, Minist Educ, Beijing 100876, Peoples R China
[2] BUPT, Coll Cyberspace Secur, Beijing 100876, Peoples R China
[3] BUPT, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
基金
国家重点研发计划;
关键词
Security protocol; formal analysis; wearable device protocol; scyther; tamarin-prover; KEY AGREEMENT SCHEME; INTERNET; SECURITY;
D O I
10.1109/ACCESS.2019.2927772
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For wearable devices, this paper proposes an authentication protocol eWMDP. We formally model and analyze it. In the execution model of the protocol, a Dolev-Yao adversary is constituted. With the above, various security properties can be defined for measuring security performance. Our protocol can achieve the injective-auth property, in which case it surpasses another existing wearable authentication protocol-WMDP. In addition, our analysis work is confirmed by Scyther and tamain-prover, and the two protocols are implemented on PC and on Ti CC3200 LAUNCHPAD widely used in wearable devices in the meanwhile. The results of experiments highlight the higher transmission efficiency of eWMDP under various configurations, including different platforms, sorts of combinations of encryption algorithms and hash algorithms, and sending packets in different sizes.
引用
收藏
页码:97771 / 97783
页数:13
相关论文
共 50 条
  • [31] A New Logic for the Design of Authentication Protocol
    Zheng Jun-jie
    Ye Song
    Liu Zhi-hua
    Ma Ying
    Ma Jin-gang
    12TH ANNUAL MEETING OF CHINA ASSOCIATION FOR SCIENCE AND TECHNOLOGY ON INFORMATION AND COMMUNICATION TECHNOLOGY AND SMART GRID, 2010, : 459 - +
  • [32] Verifying a secure authentication protocol for IoT medical devices
    Woo-Sik Bae
    Cluster Computing, 2019, 22 : 1985 - 1990
  • [33] A Robust Anonymity Preserving Authentication Protocol for IoT Devices
    Tewari, Aakanksha
    Gupta, B. B.
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [34] A Novel Authentication Protocol for IoT-Enabled Devices
    He, Daojing
    Zhao, Ziming
    Chan, Sammy
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 867 - 876
  • [35] A lightweight anonymous user authentication and key establishment scheme for wearable devices
    Gupta, Ankur
    Tripathi, Meenakshi
    Shaikh, Tabish Jamil
    Sharma, Aakar
    COMPUTER NETWORKS, 2019, 149 : 29 - 42
  • [36] BLE-Based Authentication Protocol for Micropayment Using Wearable Device
    Lo, Nai-Wei
    Yohan, Alexander
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (04) : 2351 - 2372
  • [37] Formal Analysis of IBC Protocol
    Wei, Qiuyang
    Zhao, Xufeng
    Zhu, Xue-Yang
    Zhang, Wenhui
    2023 IEEE 31ST INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, ICNP, 2023,
  • [38] A Formal Analysis of 5G Authentication
    Basin, David
    Dreier, Jannik
    Hirschi, Lucca
    Radomirovic, Sasa
    Sasse, Ralf
    Stettler, Vincent
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1383 - 1396
  • [39] Advanced formal authentication protocol using smart cards for network applicants
    Limbasiya, Trupil
    Soni, Mukesh
    Mishra, Sajal Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 66 : 50 - 63
  • [40] Design of three-factor secure and efficient authentication and key-sharing protocol for IoT devices
    Wang, Zhenyu
    Deng, Ding
    Hou, Shen
    Guo, Yang
    Li, Shaoqing
    COMPUTER COMMUNICATIONS, 2023, 203 : 1 - 14