Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices

被引:0
|
作者
Lu, Bo [1 ,2 ]
Cao, Ruohan [1 ,3 ]
Lu, Yueming [1 ,3 ]
Luo, Xueting [1 ,2 ]
机构
[1] BUPT, Key Lab Trustworthy Distributed Comp & Serv, Minist Educ, Beijing 100876, Peoples R China
[2] BUPT, Coll Cyberspace Secur, Beijing 100876, Peoples R China
[3] BUPT, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
基金
国家重点研发计划;
关键词
Security protocol; formal analysis; wearable device protocol; scyther; tamarin-prover; KEY AGREEMENT SCHEME; INTERNET; SECURITY;
D O I
10.1109/ACCESS.2019.2927772
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For wearable devices, this paper proposes an authentication protocol eWMDP. We formally model and analyze it. In the execution model of the protocol, a Dolev-Yao adversary is constituted. With the above, various security properties can be defined for measuring security performance. Our protocol can achieve the injective-auth property, in which case it surpasses another existing wearable authentication protocol-WMDP. In addition, our analysis work is confirmed by Scyther and tamain-prover, and the two protocols are implemented on PC and on Ti CC3200 LAUNCHPAD widely used in wearable devices in the meanwhile. The results of experiments highlight the higher transmission efficiency of eWMDP under various configurations, including different platforms, sorts of combinations of encryption algorithms and hash algorithms, and sending packets in different sizes.
引用
收藏
页码:97771 / 97783
页数:13
相关论文
共 50 条
  • [41] Formal analysis of QUIC handshake protocol using ProVerif
    Zhang, Jingjing
    Yang, Lin
    Gao, Xianming
    Wang, Qiang
    2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020), 2020, : 132 - 138
  • [42] ECC-reliant secure authentication protocol for cloud server and smart devices in IoT
    Selvi, K.
    Muthumanickam, K.
    Vijayalakshmi, P.
    Mahesh, P. C. Senthil
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (11) : 12191 - 12218
  • [43] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105
  • [44] Regression Based Logic for Authentication Protocol Design
    Ocenasek, Pavel
    Hranac, Jakub
    2010 INTERNATIONAL CONFERENCE ON COMMUNICATION AND VEHICULAR TECHNOLOGY (ICCVT 2010), VOL I, 2010, : 89 - 92
  • [45] Formal Analysis of the Signal Protocol using the Scyther Tool
    Almuzaini, Nawal Zaied
    Ahmad, Iftikhar
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [46] Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment
    Kang, Baoyuan
    Han, Yanbao
    Qian, Kun
    Du, Jianqi
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [47] A novel grouping proof authentication protocol for lightweight devices: GPAPXR
    Aydin, Omer
    Dalkilic, Gokhan
    Kosemen, Cem
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2020, 28 (05) : 3036 - 3051
  • [48] Provably Secure Crossdomain Multifactor Authentication Protocol for Wearable Health Monitoring Systems
    Zhang, Hui
    Qian, Yuanyuan
    Jiang, Qi
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [49] Analysis of an Improved RFID Authentication Protocol
    LI Heng GAO Fei XUE Yanming FENG ShuoBeijing Institute of TechnologyBeijing China
    微计算机信息, 2010, 26 (32) : 129 - 130+190
  • [50] 5G Authentication Protocol Based on Sub-mode Switching Operation and Its Formal Analysis
    Liu Y.-B.
    Zhou G.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (08): : 3708 - 3725