Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA

被引:22
|
作者
Yogesh, Patil Rachana [1 ]
Satish, Devane R. [2 ]
机构
[1] AC Patil Coll Engn, Kharghar 410210, Navi Mumbai, India
[2] Datta Meghe Coll Engn, Airoli 400708, Navi Mumbai, India
关键词
Digital Forensics; Digital Evidence; BAN Logic; AVISPA;
D O I
10.1016/j.procs.2020.03.449
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The effect of digitization has led to an increased dependency on the internet. At the same time, cyber-attacks are on the rise due to this increased digitization. In cybercrime cases, digital evidence is of utmost importance. The forensic investigation process always begins after the incident occurred, by that time intelligent attackers got enough time to destroy the traces. This paper proposes a prior evidence capture protocol, that will help in the simultaneous collection of evidence when the crime has occurred. This collected evidence is in the form of device fingerprint which will uniquely identify the fingeprintee client device. In the future, if the dispute arises these prior captured device fingerprints can be used as legal evidence and help in the process of forensic investigation. The proposed protocol uses the concept of a trusted time stamping server (TTSS) to prove the integrity and nonrepudiation of the collected evidence. The timestamps are attached by the trusted third party TTSS with all collected evidence, these timestamps cannot be changed by local client devices. The paper also provides security validation of the proposed protocol by using Burrows Abadi Needham (BAN) logic. The formal verification is also done by using the AVISPA tool. The results of AVISPA shows that the proposed protocol is safe under OFMC and Cl-AtSe model. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1334 / 1344
页数:11
相关论文
共 50 条
  • [31] Formal behavior verification of HLA federations using temporal logic
    Brade, D
    MODELLING AND SIMULATION 2002, 2002, : 273 - 277
  • [32] Formal Verification of Quantum Algorithms Using Quantum Hoare Logic
    Liu, Junyi
    Zhan, Bohua
    Wang, Shuling
    Ying, Shenggang
    Liu, Tao
    Li, Yangjia
    Ying, Mingsheng
    Zhan, Naijun
    COMPUTER AIDED VERIFICATION, CAV 2019, PT II, 2019, 11562 : 187 - 207
  • [33] Formal verification of a group membership protocol using model checking
    Rosset, Valerio
    Souto, Pedro F.
    Vasques, Francisco
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPLS, DOA, ODBASE, GADA, AND IS, PT 1, PROCEEDINGS, 2007, 4803 : 471 - 488
  • [34] Improvement of a Service Level Negotiation Protocol using Formal Verification
    Chalouf, Mohamed Aymen
    Krief, Francine
    Mbarek, Nader
    Lemlouma, Tayeb
    2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [35] Formal Specification and Verification of CSMA/CD Protocol Using Z
    Shukur, Zarina
    Alias, Nursyahidah
    Idrus, Bahari
    Halip, Mohd Hazali Mohamed
    JURNAL KEJURUTERAAN, 2009, 21 : 85 - 96
  • [36] Formal verification of the heap manager of an operating system using separation logic
    Marti, Nicolas
    Affeldt, Reynald
    Yonezawa, Akinori
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2006, 4260 : 400 - +
  • [37] Formal verification of the heap manager of an operating system using separation logic
    Marti, Nicolas
    Affeldt, Reynald
    Yonezawa, Akinori
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2006, 4260 LNCS : 400 - 419
  • [38] Where you are Based Authentication: An Improved Security Protocol Using BAN Logic
    Nabih, Abdelmajid
    Hossain, Alamgir
    Shepherd, Simon
    Khaled, Mahmoud
    PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 153 - 162
  • [39] Secure and Robust Telemedicine Using ECC on Radix-8 With Formal Verification
    Kumar, Gautam
    Saini, Hemraj
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (01) : 13 - 28
  • [40] Formal specification and verification of a team formation protocol using TLA+
    Niyogi, Rajdeep
    Nath, Amar
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (06): : 961 - 984