Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol

被引:0
|
作者
Mahboubi, Arash [1 ]
Camtepe, Seyit [2 ]
Morarji, Hasmukh [1 ]
机构
[1] Queensland Univ Technol, Elect & Comp Engn, Brisbane, Qld, Australia
[2] CSIRO, Data61, Sydney, NSW, Australia
关键词
USB security; USB attack surface; Internet of Things (IoT); mobile malware; Coloured Petri Nets (CPN) modelling; epidemic model; PROPAGATION; MALWARE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A privately owned smart device connected to a corporate network using a USB connection creates a potential channel for malware infection and its subsequent spread. For example, air-gapped (a.k.a. isolated) systems are considered to be the most secure and safest places for storing critical datasets. However, unlike network communications, USB connection streams have no authentication and filtering. Consequently, intentional or unintentional piggybacking of a malware infected USB storage or a mobile device through the air-gap is sufficient to spread infection into such systems. Our findings show that the contact rate has an exceptional impact on malware spread and destabilizing free malware equilibrium. This work proposes a USB authentication and delegation protocol based on radiofrequency identification (RFID) in order to stabilize the free malware equilibrium in air-gapped networks. The proposed protocol is modelled using Coloured Petri nets (CPN) and the model is verified and validated through CPN tools.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] A lightweight RFID authentication protocol for mobile reader
    Liming, Z. (urchin2012@sina.com), 1600, Advanced Institute of Convergence Information Technology (06):
  • [32] An Improved Lightweight Identity Authentication Protocol for VANET
    Wang, Peng
    Liu, Yining
    Lv, Songzhan
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (05): : 1491 - 1504
  • [33] LIMAP: A Lightweight Multilayer Authentication Protocol for WBAN
    Purbasha Das
    Anjali Vashisth
    Devanshi Chadha
    S. Ananda Kumar
    Amit Banerjee
    Stavros Shiaeles
    Wireless Personal Communications, 2021, 121 : 2857 - 2884
  • [34] A Lightweight Authentication Protocol Scheme for RFID Security
    WEI Guoheng
    ZHANG Huanguo
    Wuhan University Journal of Natural Sciences, 2013, 18 (06) : 504 - 510
  • [35] RFID lightweight authentication protocol based on PRF
    Jin, Yongming
    Wu, Qiying
    Shi, Zhiqiang
    Lu, Xiang
    Sun, Limin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (07): : 1506 - 1514
  • [36] A Lightweight RFID Authentication Protocol with confidentiality and Anonymity
    Shi, Zhicai
    Chen, Jiwei
    Chen, Shanshan
    Ren, Shitao
    2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 1631 - 1634
  • [37] Lightweight Authentication Protocol Deployment over FlexRay
    Mousa, Ahmed Refaat
    NourElDeen, Pakinam
    Azer, Marianne
    Allam, Mahmoud
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 233 - 239
  • [38] A Lightweight RFID Mutual Authentication Protocol with PUF
    Zhu, Feng
    Li, Peng
    Xu, He
    Wang, Ruchuan
    SENSORS, 2019, 19 (13)
  • [39] A lightweight identity authentication protocol for vehicular networks
    Jung-Shian Li
    Kun-Hsuan Liu
    Telecommunication Systems, 2013, 53 : 425 - 438
  • [40] A decentralized lightweight authentication protocol under blockchain
    Xu, Mingcheng
    Xu, Gaojian
    Xu, Haoyu
    Zhou, Jiadong
    Li, Shaowen
    Concurrency and Computation: Practice and Experience, 2022, 34 (13):