Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices

被引:0
|
作者
Lu, Bo [1 ,2 ]
Cao, Ruohan [1 ,3 ]
Lu, Yueming [1 ,3 ]
Luo, Xueting [1 ,2 ]
机构
[1] BUPT, Key Lab Trustworthy Distributed Comp & Serv, Minist Educ, Beijing 100876, Peoples R China
[2] BUPT, Coll Cyberspace Secur, Beijing 100876, Peoples R China
[3] BUPT, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
基金
国家重点研发计划;
关键词
Security protocol; formal analysis; wearable device protocol; scyther; tamarin-prover; KEY AGREEMENT SCHEME; INTERNET; SECURITY;
D O I
10.1109/ACCESS.2019.2927772
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For wearable devices, this paper proposes an authentication protocol eWMDP. We formally model and analyze it. In the execution model of the protocol, a Dolev-Yao adversary is constituted. With the above, various security properties can be defined for measuring security performance. Our protocol can achieve the injective-auth property, in which case it surpasses another existing wearable authentication protocol-WMDP. In addition, our analysis work is confirmed by Scyther and tamain-prover, and the two protocols are implemented on PC and on Ti CC3200 LAUNCHPAD widely used in wearable devices in the meanwhile. The results of experiments highlight the higher transmission efficiency of eWMDP under various configurations, including different platforms, sorts of combinations of encryption algorithms and hash algorithms, and sending packets in different sizes.
引用
下载
收藏
页码:97771 / 97783
页数:13
相关论文
共 50 条
  • [1] Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment
    Das, Ashok Kumar
    Wazid, Mohammad
    Kumar, Neeraj
    Khan, Muhammad Khurram
    Choo, Kim-Kwang Raymond
    Park, YoungHo
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2018, 22 (04) : 1310 - 1322
  • [2] An Authentication Protocol for Wearable Medical Devices
    Long, William J.
    Lin, Wei
    2017 13TH INTERNATIONAL CONFERENCE AND EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2017,
  • [3] Design and Formal Analysis of Highly Effective Authentication Protocol
    Shi, Mingxia
    Li, Huaiqiang
    Chen, Li
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 3137 - 3142
  • [4] Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
    Hwang, Doo-Hee
    Shin, Jin-Myeong
    Choi, Yoon-Ho
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 694 - 696
  • [5] Design and Evaluation of an Authentication Framework for Wearable Devices
    Alharbi, Abdullah
    Alharbi, Talal
    IEEE Access, 2020, 8 : 80369 - 80381
  • [6] Design and Evaluation of an Authentication Framework for Wearable Devices
    Alharbi, Abdullah
    Alharbi, Talal
    IEEE ACCESS, 2020, 8 : 80369 - 80381
  • [7] Cryptanalysis of A Secure and Lightweight Authentication Protocol for Wearable Devices Environment
    Kumar, Devender
    Grover, Harmanpreet Singh
    Adarsh
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 1063 - 1068
  • [8] A secure authentication protocol for wearable devices environment using ECC
    Kumar, Devender
    Grover, Harmanpreet Singh
    Adarsh
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 (8-15) : 8 - 15
  • [9] ECG Authentication System Design Based on Signal Analysis in Mobile and Wearable Devices
    Kang, Shin Jae
    Lee, Seung Yong
    Cho, Hyo Il
    Park, Hyunggon
    IEEE SIGNAL PROCESSING LETTERS, 2016, 23 (06) : 805 - 808
  • [10] A new authentication protocol and its formal analysis
    Wen, Jinghua
    Zhang, Mei
    Li, Xiang
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (08): : 159 - 161