Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol

被引:0
|
作者
Mahboubi, Arash [1 ]
Camtepe, Seyit [2 ]
Morarji, Hasmukh [1 ]
机构
[1] Queensland Univ Technol, Elect & Comp Engn, Brisbane, Qld, Australia
[2] CSIRO, Data61, Sydney, NSW, Australia
关键词
USB security; USB attack surface; Internet of Things (IoT); mobile malware; Coloured Petri Nets (CPN) modelling; epidemic model; PROPAGATION; MALWARE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A privately owned smart device connected to a corporate network using a USB connection creates a potential channel for malware infection and its subsequent spread. For example, air-gapped (a.k.a. isolated) systems are considered to be the most secure and safest places for storing critical datasets. However, unlike network communications, USB connection streams have no authentication and filtering. Consequently, intentional or unintentional piggybacking of a malware infected USB storage or a mobile device through the air-gap is sufficient to spread infection into such systems. Our findings show that the contact rate has an exceptional impact on malware spread and destabilizing free malware equilibrium. This work proposes a USB authentication and delegation protocol based on radiofrequency identification (RFID) in order to stabilize the free malware equilibrium in air-gapped networks. The proposed protocol is modelled using Coloured Petri nets (CPN) and the model is verified and validated through CPN tools.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] A Secure and Lightweight Authentication Protocol for RFID
    Liu Cheng
    Lin Shenwen
    Li Yingbo
    Li Na
    Wang Xuren
    PROCEEDINGS OF 2015 IEEE 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION, 2015, : 317 - 320
  • [22] Enhanced Delegation-Based Authentication Protocol for PCSs
    Lee, Tian-Fu
    Chang, Shu-Hui
    Hwang, Tzonelih
    Chong, Song-Kong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) : 2166 - 2171
  • [23] An Improved Delegation-Based Authentication Protocol for PCSs
    Lee, Cheng-Chi
    Chang, Rui-Xiang
    Chen, Te-Yu
    Chen, Lung Albert
    INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (03): : 258 - 267
  • [24] A universal lightweight authentication scheme based on delegation mechanism in heterogeneous networks
    Yang, Chou-Chen
    Lo, Shin-Hao
    Lu, Eric Jui-Lin
    2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 963 - 966
  • [25] A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol
    Barrero, David F.
    Hernandez-Castro, Julio Cesar
    Peris-Lopez, Pedro
    Camacho, David
    R-Moreno, Maria D.
    EXPERT SYSTEMS, 2014, 31 (01) : 9 - 19
  • [26] Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs
    Gope, Prosanta
    Hwang, Tzonelih
    INFORMATION TECHNOLOGY AND CONTROL, 2015, 44 (03): : 329 - 333
  • [27] A Provably Secure, Lightweight Protocol for Anonymous Authentication
    Katz, Jonathan
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 271 - 288
  • [28] Scalable Lightweight Authentication Protocol with Privacy Preservation
    Liu, Yanfei
    Feng, Sha
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 474 - 478
  • [29] A Lightweight Aggregate Authentication Protocol for Internet of Drones
    Bhattarai, Image
    Pu, Cong
    Choo, Kim-Kwang Raymond
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 143 - 151
  • [30] Lightweight RFID authentication protocol: An experimental study
    Belcher, Brandon
    El-Said, Mostafa
    Nezlek, George
    PROCEEDINGS OF THE ITI 2008 30TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2008, : 583 - +