Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices

被引:0
|
作者
Lu, Bo [1 ,2 ]
Cao, Ruohan [1 ,3 ]
Lu, Yueming [1 ,3 ]
Luo, Xueting [1 ,2 ]
机构
[1] BUPT, Key Lab Trustworthy Distributed Comp & Serv, Minist Educ, Beijing 100876, Peoples R China
[2] BUPT, Coll Cyberspace Secur, Beijing 100876, Peoples R China
[3] BUPT, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
基金
国家重点研发计划;
关键词
Security protocol; formal analysis; wearable device protocol; scyther; tamarin-prover; KEY AGREEMENT SCHEME; INTERNET; SECURITY;
D O I
10.1109/ACCESS.2019.2927772
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For wearable devices, this paper proposes an authentication protocol eWMDP. We formally model and analyze it. In the execution model of the protocol, a Dolev-Yao adversary is constituted. With the above, various security properties can be defined for measuring security performance. Our protocol can achieve the injective-auth property, in which case it surpasses another existing wearable authentication protocol-WMDP. In addition, our analysis work is confirmed by Scyther and tamain-prover, and the two protocols are implemented on PC and on Ti CC3200 LAUNCHPAD widely used in wearable devices in the meanwhile. The results of experiments highlight the higher transmission efficiency of eWMDP under various configurations, including different platforms, sorts of combinations of encryption algorithms and hash algorithms, and sending packets in different sizes.
引用
下载
收藏
页码:97771 / 97783
页数:13
相关论文
共 50 条
  • [21] Design and analysis of telemedicine authentication protocol
    Zheng, Lijuan
    Song, Chunlei
    Zhang, Rui
    Lv, Baoqing
    Liu, Yujin
    Cui, Meng
    Meng, Lili
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2021, 37 (03) : 198 - 208
  • [22] Formal Analysis and Verification for an Ultralightweight Authentication Protocol RAPP of RFID
    Li, Wei
    Xiao, Meihua
    Li, Yanan
    Mei, Yingtian
    Zhong, Xiaomei
    Tu, Jimin
    THEORETICAL COMPUTER SCIENCE, NCTCS 2017, 2017, 768 : 119 - 132
  • [23] Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
    AL-Saraireh, Ja'afer M.
    Saraireh, Mohammad S.
    Saraireh, Saleh S.
    Al Nabhan, Mohammad M.
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2011, 11 (02): : 86 - 92
  • [24] Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther
    Yang, Huihui
    Prinz, Andreas
    Oleshchuk, Vladmir
    2016 24TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP), 2016, : 553 - 557
  • [25] Formal analysis of robust email protocol based on authentication tests
    Jiang, Rui
    Hu, Aiqun
    Journal of Southeast University (English Edition), 2009, 25 (02) : 147 - 151
  • [26] Formal Analysis of Authentication Protocol Based on Directed Graph Model
    Li, Changchun
    Wang, Kangnian
    Zhu, Xingtao
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 829 - 835
  • [27] Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol
    Feng, Tao
    Wu, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [28] Lightweight authentication protocols for wearable devices
    Das, Ashok Kumar
    Zeadally, Sherali
    Wazid, Mohammad
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 63 : 196 - 208
  • [29] The yoking-proof-based authentication protocol for cloud-assisted wearable devices
    Liu, Wei
    Liu, Hong
    Wan, Yueliang
    Kong, Huafeng
    Ning, Huansheng
    PERSONAL AND UBIQUITOUS COMPUTING, 2016, 20 (03) : 469 - 479
  • [30] The yoking-proof-based authentication protocol for cloud-assisted wearable devices
    Wei Liu
    Hong Liu
    Yueliang Wan
    Huafeng Kong
    Huansheng Ning
    Personal and Ubiquitous Computing, 2016, 20 : 469 - 479