Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA

被引:22
|
作者
Yogesh, Patil Rachana [1 ]
Satish, Devane R. [2 ]
机构
[1] AC Patil Coll Engn, Kharghar 410210, Navi Mumbai, India
[2] Datta Meghe Coll Engn, Airoli 400708, Navi Mumbai, India
关键词
Digital Forensics; Digital Evidence; BAN Logic; AVISPA;
D O I
10.1016/j.procs.2020.03.449
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The effect of digitization has led to an increased dependency on the internet. At the same time, cyber-attacks are on the rise due to this increased digitization. In cybercrime cases, digital evidence is of utmost importance. The forensic investigation process always begins after the incident occurred, by that time intelligent attackers got enough time to destroy the traces. This paper proposes a prior evidence capture protocol, that will help in the simultaneous collection of evidence when the crime has occurred. This collected evidence is in the form of device fingerprint which will uniquely identify the fingeprintee client device. In the future, if the dispute arises these prior captured device fingerprints can be used as legal evidence and help in the process of forensic investigation. The proposed protocol uses the concept of a trusted time stamping server (TTSS) to prove the integrity and nonrepudiation of the collected evidence. The timestamps are attached by the trusted third party TTSS with all collected evidence, these timestamps cannot be changed by local client devices. The paper also provides security validation of the proposed protocol by using Burrows Abadi Needham (BAN) logic. The formal verification is also done by using the AVISPA tool. The results of AVISPA shows that the proposed protocol is safe under OFMC and Cl-AtSe model. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1334 / 1344
页数:11
相关论文
共 50 条
  • [21] Security Analysis of the Kerberos protocol using BAN logic
    Fan, Kai
    Li, Hui
    Wang, Yue
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 467 - +
  • [22] Key exchange protocol for Wireless Sensor Network: Formal verification using CSN modal logic
    Li, Yue
    Newe, Thomas
    2008 IEEE SENSORS APPLICATIONS SYMPOSIUM, 2008, : 193 - 198
  • [23] Formal Verification of RGR-SEC, a Secured RGR Routing for UAANETs Using AVISPA, Scyther and Tamarin
    Mohamadi, Houssem E.
    Kara, Nadjia
    Lagha, Mohand
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2018, 2018, 878 : 3 - 16
  • [24] Formal Verification of mCWQ Using Extended Hoare Logic
    Wanling Xie
    Huibiao Zhu
    Xi Wu
    Phan Cong Vinh
    Mobile Networks and Applications, 2019, 24 : 134 - 144
  • [25] Formal Verification of Ladder Logic programs using NuSMV
    Kottler, Sam
    Khayamy, Mehdy
    Hasan, Syed Rafay
    Elkeelany, Omar
    SOUTHEASTCON 2017, 2017,
  • [26] Formal Verification of mCWQ Using Extended Hoare Logic
    Xie, Wanling
    Zhu, Huibiao
    Wu, Xi
    Phan Cong Vinh
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (01): : 134 - 144
  • [27] SSMBP: A Secure SMS-based Mobile Banking Protocol with Formal Verification
    Bojjagani, Sriramulu
    Sastry, V. N.
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 252 - 259
  • [28] Analysis of LEACH Protocol(s) using Formal Verification
    Ihsan, A.
    Saghar, K.
    Fatima, T.
    2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 254 - 262
  • [29] Formal Verification of the Pastry Protocol Using TLA+
    Lu, Tianxiang
    DEPENDABLE SOFTWARE ENGINEERING: THEORIES, TOOLS, AND APPLICATIONS, SETTA 2015, 2015, 9409 : 284 - 299
  • [30] Formal verification of communication protocol using type theory
    Zhang, XY
    Xie, XR
    Munro, M
    Harman, M
    Hu, L
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 1585 - 1593