Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA

被引:22
|
作者
Yogesh, Patil Rachana [1 ]
Satish, Devane R. [2 ]
机构
[1] AC Patil Coll Engn, Kharghar 410210, Navi Mumbai, India
[2] Datta Meghe Coll Engn, Airoli 400708, Navi Mumbai, India
来源
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE | 2020年 / 167卷
关键词
Digital Forensics; Digital Evidence; BAN Logic; AVISPA;
D O I
10.1016/j.procs.2020.03.449
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The effect of digitization has led to an increased dependency on the internet. At the same time, cyber-attacks are on the rise due to this increased digitization. In cybercrime cases, digital evidence is of utmost importance. The forensic investigation process always begins after the incident occurred, by that time intelligent attackers got enough time to destroy the traces. This paper proposes a prior evidence capture protocol, that will help in the simultaneous collection of evidence when the crime has occurred. This collected evidence is in the form of device fingerprint which will uniquely identify the fingeprintee client device. In the future, if the dispute arises these prior captured device fingerprints can be used as legal evidence and help in the process of forensic investigation. The proposed protocol uses the concept of a trusted time stamping server (TTSS) to prove the integrity and nonrepudiation of the collected evidence. The timestamps are attached by the trusted third party TTSS with all collected evidence, these timestamps cannot be changed by local client devices. The paper also provides security validation of the proposed protocol by using Burrows Abadi Needham (BAN) logic. The formal verification is also done by using the AVISPA tool. The results of AVISPA shows that the proposed protocol is safe under OFMC and Cl-AtSe model. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1334 / 1344
页数:11
相关论文
共 9 条
  • [1] Design and Formal Analysis of Electronic Voting Protocol using AVISPA
    Oo, Htet Ne
    Aung, Aye Moe
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 1 - 8
  • [2] Design of an Enhanced Authentication Protocol and Its Verification using AVISPA
    Amin, Ruhul
    Islam, S. K. Hafizul
    Karati, Arijit
    Biswas, G. P.
    2016 3RD INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN INFORMATION TECHNOLOGY (RAIT), 2016, : 404 - 409
  • [3] An Improved Secure Authentication Protocol for WiMAX with Formal Verification
    Rai, Anjani Kumar
    Mishra, Shivendu
    Tripathi, Pramod Narayan
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 407 - +
  • [4] Secure Protocol for Financial Transactions Using Smartphones - SPFT Formally Proved by AVISPA
    Sultan, Shizra
    Abbasi, Abdul Ghafoor
    Shibli, Awais
    Nasir, Ali
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 387 - 392
  • [5] A secure handover protocol design in wireless networks with formal verification
    Lim, Sun-Hee
    Bang, Ki-Seok
    Yi, Okyeon
    Lim, Jongin
    WIRED/WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2007, 4517 : 67 - +
  • [6] Formal verification of bundle authentication mechanism in OSGi service platform: BAN Logic
    Kim, YG
    Moon, CJ
    Jeong, DW
    Baik, DK
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2006, 16 (02) : 153 - 173
  • [7] SSMBP: A Secure SMS-based Mobile Banking Protocol with Formal Verification
    Bojjagani, Sriramulu
    Sastry, V. N.
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 252 - 259
  • [8] Where you are Based Authentication: An Improved Security Protocol Using BAN Logic
    Nabih, Abdelmajid
    Hossain, Alamgir
    Shepherd, Simon
    Khaled, Mahmoud
    PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 153 - 162
  • [9] A lightweight and secure NFC-base mobile payment protocol ensuring fair exchange based on a hybrid encryption algorithm with formal verification
    Thammarat, Chalee
    Kurutach, Werasak
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (12)