Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA

被引:22
|
作者
Yogesh, Patil Rachana [1 ]
Satish, Devane R. [2 ]
机构
[1] AC Patil Coll Engn, Kharghar 410210, Navi Mumbai, India
[2] Datta Meghe Coll Engn, Airoli 400708, Navi Mumbai, India
关键词
Digital Forensics; Digital Evidence; BAN Logic; AVISPA;
D O I
10.1016/j.procs.2020.03.449
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The effect of digitization has led to an increased dependency on the internet. At the same time, cyber-attacks are on the rise due to this increased digitization. In cybercrime cases, digital evidence is of utmost importance. The forensic investigation process always begins after the incident occurred, by that time intelligent attackers got enough time to destroy the traces. This paper proposes a prior evidence capture protocol, that will help in the simultaneous collection of evidence when the crime has occurred. This collected evidence is in the form of device fingerprint which will uniquely identify the fingeprintee client device. In the future, if the dispute arises these prior captured device fingerprints can be used as legal evidence and help in the process of forensic investigation. The proposed protocol uses the concept of a trusted time stamping server (TTSS) to prove the integrity and nonrepudiation of the collected evidence. The timestamps are attached by the trusted third party TTSS with all collected evidence, these timestamps cannot be changed by local client devices. The paper also provides security validation of the proposed protocol by using Burrows Abadi Needham (BAN) logic. The formal verification is also done by using the AVISPA tool. The results of AVISPA shows that the proposed protocol is safe under OFMC and Cl-AtSe model. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1334 / 1344
页数:11
相关论文
共 50 条
  • [1] Formal Verification of Wireless Sensor Key Exchange Protocol using AVISPA
    Kasraoui, Mohamed
    Cabani, Adnane
    Chafouk, Houcine
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 387 - 390
  • [2] Formal Verification of the Lowe modified BAN concrete Andrew Secure RPC Protocol
    Filali, Rajaa
    Bouhdadi, Mohamed
    2015 THIRD INTERNATIONAL WORKSHOP ON RFID AND ADAPTIVE WIRELESS SENSOR NETWORKS (RAWSN), 2015, : 18 - 22
  • [3] Design and Formal Analysis of Electronic Voting Protocol using AVISPA
    Oo, Htet Ne
    Aung, Aye Moe
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 1 - 8
  • [4] An Improved Security Protocol Formal Analysis with BAN Logic
    Li Tingyuan
    Liu Xiaodong
    Qin Zhiguang
    Zhang Xuanfang
    ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS, 2009, : 102 - +
  • [5] FORMAL VERIFICATION OF THE SECURE SOCKETS LAYER PROTOCOL
    Tobarra, Llanos
    Cazorla, Diego
    Pardo, J. Jose
    Cuartero, Fernando
    ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-2: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 2, 2008, : 246 - 252
  • [6] Formal Verification of a Secure Mobile Banking Protocol
    Huy Hoang Ngo
    Dandash, Osama
    Phu Dung Le
    Srinivasan, Bala
    Wilson, Campbell
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 410 - 421
  • [7] Design of an Enhanced Authentication Protocol and Its Verification using AVISPA
    Amin, Ruhul
    Islam, S. K. Hafizul
    Karati, Arijit
    Biswas, G. P.
    2016 3RD INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN INFORMATION TECHNOLOGY (RAIT), 2016, : 404 - 409
  • [8] Formal Specifications and Verification of a Secure Communication Protocol Model
    Xia Yang 1
    2. Research Center for Information Network Security
    JournalofSystemsEngineeringandElectronics, 2003, (02) : 90 - 97
  • [9] Formal Verification of Cryptographic Protocol for Secure RFID System
    Kim, Hyun-Seok
    Oh, Jung-Hyun
    Kim, Ju-Bae
    Jeong, Yeon-Oh
    Choi, Jin-Young
    NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 470 - 477
  • [10] An Improved Secure Authentication Protocol for WiMAX with Formal Verification
    Rai, Anjani Kumar
    Mishra, Shivendu
    Tripathi, Pramod Narayan
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 407 - +