Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA

被引:26
作者
Yogesh, Patil Rachana [1 ]
Satish, Devane R. [2 ]
机构
[1] AC Patil Coll Engn, Kharghar 410210, Navi Mumbai, India
[2] Datta Meghe Coll Engn, Airoli 400708, Navi Mumbai, India
来源
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE | 2020年 / 167卷
关键词
Digital Forensics; Digital Evidence; BAN Logic; AVISPA;
D O I
10.1016/j.procs.2020.03.449
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The effect of digitization has led to an increased dependency on the internet. At the same time, cyber-attacks are on the rise due to this increased digitization. In cybercrime cases, digital evidence is of utmost importance. The forensic investigation process always begins after the incident occurred, by that time intelligent attackers got enough time to destroy the traces. This paper proposes a prior evidence capture protocol, that will help in the simultaneous collection of evidence when the crime has occurred. This collected evidence is in the form of device fingerprint which will uniquely identify the fingeprintee client device. In the future, if the dispute arises these prior captured device fingerprints can be used as legal evidence and help in the process of forensic investigation. The proposed protocol uses the concept of a trusted time stamping server (TTSS) to prove the integrity and nonrepudiation of the collected evidence. The timestamps are attached by the trusted third party TTSS with all collected evidence, these timestamps cannot be changed by local client devices. The paper also provides security validation of the proposed protocol by using Burrows Abadi Needham (BAN) logic. The formal verification is also done by using the AVISPA tool. The results of AVISPA shows that the proposed protocol is safe under OFMC and Cl-AtSe model. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1334 / 1344
页数:11
相关论文
共 16 条
[1]  
[Anonymous], 2006, ARTIST2 WORKSH SEC S
[2]  
[Anonymous], 2001, RFC3161
[3]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[4]  
AVISPA, 2017, AVISPA AUTOMATED VAL
[5]  
Basin David A., 2005, International Journal of Information Security, V4, P181, DOI [10.1007/s10207-004-0055-7, DOI 10.1007/S10207-004-0055-7]
[6]   A LOGIC OF AUTHENTICATION [J].
BURROWS, M ;
ABADI, M ;
NEEDHAM, RM .
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871) :233-271
[7]  
Cosic Jasmin, 2010, 2010 33rd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), P1226
[8]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[9]  
Hosmer C., 2002, IJDE, V1, P1
[10]  
Koen R., 2008, ISSA, P1