Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices

被引:0
|
作者
Lu, Bo [1 ,2 ]
Cao, Ruohan [1 ,3 ]
Lu, Yueming [1 ,3 ]
Luo, Xueting [1 ,2 ]
机构
[1] BUPT, Key Lab Trustworthy Distributed Comp & Serv, Minist Educ, Beijing 100876, Peoples R China
[2] BUPT, Coll Cyberspace Secur, Beijing 100876, Peoples R China
[3] BUPT, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
基金
国家重点研发计划;
关键词
Security protocol; formal analysis; wearable device protocol; scyther; tamarin-prover; KEY AGREEMENT SCHEME; INTERNET; SECURITY;
D O I
10.1109/ACCESS.2019.2927772
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For wearable devices, this paper proposes an authentication protocol eWMDP. We formally model and analyze it. In the execution model of the protocol, a Dolev-Yao adversary is constituted. With the above, various security properties can be defined for measuring security performance. Our protocol can achieve the injective-auth property, in which case it surpasses another existing wearable authentication protocol-WMDP. In addition, our analysis work is confirmed by Scyther and tamain-prover, and the two protocols are implemented on PC and on Ti CC3200 LAUNCHPAD widely used in wearable devices in the meanwhile. The results of experiments highlight the higher transmission efficiency of eWMDP under various configurations, including different platforms, sorts of combinations of encryption algorithms and hash algorithms, and sending packets in different sizes.
引用
下载
收藏
页码:97771 / 97783
页数:13
相关论文
共 50 条
  • [41] Security Analysis on an Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems
    Eom, Gayeong
    Byeon, Haewon
    Choi, Younsung
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (05) : 115 - 121
  • [42] Analysis and design of a smart card based authentication protocol
    Kuo-Hui Yeh
    Kuo-Yu Tsai
    Jia-Li Hou
    Journal of Zhejiang University SCIENCE C, 2013, 14 : 909 - 917
  • [43] Design and Analysis of Lightweight Authentication Protocol for Securing IoD
    Jan, Saeed Ullah
    Qayum, Fawad
    Khan, Habib Ullah
    IEEE ACCESS, 2021, 9 : 69287 - 69306
  • [44] Analysis and Design of an Authentication Protocol for Space Information Network
    Zhao, Weiwei
    Zhang, Aixin
    Li, Jianhua
    Wu, Xinghua
    Liu, Yuchen
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 43 - 48
  • [45] Analysis and design of a smart card based authentication protocol
    Yeh, Kuo-Hui
    Tsai, Kuo-Yu
    Hou, Jia-Li
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (12): : 909 - 917
  • [46] Analysis and design of a smart card based authentication protocol
    KuoHui YEH
    KuoYu TSAI
    JiaLi HOU
    Journal of Zhejiang University-Science C(Computers and Electronics), 2013, 14 (12) : 909 - 917
  • [47] Analysis and design of a smart card based authentication protocol
    Kuo-Hui YEH
    Kuo-Yu TSAI
    Jia-Li HOU
    Frontiers of Information Technology & Electronic Engineering, 2013, (12) : 909 - 917
  • [48] Design and Security Analysis of Mobile Identity Authentication Protocol
    Wang Qin
    Zhi Fenhe
    Ao Jinghai
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 2645 - 2649
  • [49] Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool
    Asadi, Sepideh
    Shahhoseini, Hadi Shahriar
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1060 - 1064
  • [50] A RFID Mutual Authentication Security Protocol Design and Analysis
    Liang, Xiaobing
    Lv, Yingjie
    Zhao, Bing
    Liu, Ying
    Sun, Zhiqiang
    Cen, Wei
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 508 - 512