Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA

被引:22
|
作者
Yogesh, Patil Rachana [1 ]
Satish, Devane R. [2 ]
机构
[1] AC Patil Coll Engn, Kharghar 410210, Navi Mumbai, India
[2] Datta Meghe Coll Engn, Airoli 400708, Navi Mumbai, India
关键词
Digital Forensics; Digital Evidence; BAN Logic; AVISPA;
D O I
10.1016/j.procs.2020.03.449
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The effect of digitization has led to an increased dependency on the internet. At the same time, cyber-attacks are on the rise due to this increased digitization. In cybercrime cases, digital evidence is of utmost importance. The forensic investigation process always begins after the incident occurred, by that time intelligent attackers got enough time to destroy the traces. This paper proposes a prior evidence capture protocol, that will help in the simultaneous collection of evidence when the crime has occurred. This collected evidence is in the form of device fingerprint which will uniquely identify the fingeprintee client device. In the future, if the dispute arises these prior captured device fingerprints can be used as legal evidence and help in the process of forensic investigation. The proposed protocol uses the concept of a trusted time stamping server (TTSS) to prove the integrity and nonrepudiation of the collected evidence. The timestamps are attached by the trusted third party TTSS with all collected evidence, these timestamps cannot be changed by local client devices. The paper also provides security validation of the proposed protocol by using Burrows Abadi Needham (BAN) logic. The formal verification is also done by using the AVISPA tool. The results of AVISPA shows that the proposed protocol is safe under OFMC and Cl-AtSe model. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1334 / 1344
页数:11
相关论文
共 50 条
  • [41] Formal Verification and Improvement of the PKMv3 Protocol Using CSP
    Jiang, Jinpeng
    Mao, Hongyan
    Shaol, Rumeng
    Xu, Yuanmin
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 682 - 687
  • [42] Verification of Secure Gateway Selection Protocol Using PI-Calculus
    Rai, Abhay Kumar
    Tewari, Rajiv Ranjan
    2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [43] FORMAL VERIFICATION OF STATE-MACHINES USING HIGHER-ORDER LOGIC
    LOEWENSTEIN, PN
    PROCEEDINGS - IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN : VLSI IN COMPUTERS & PROCESSORS, 1989, : 204 - 207
  • [44] Formal Verification of ROS Based Systems Using a Linear Logic Theorem Prover
    Kortik, Sitar
    Shastha, Tejas Kumar
    2021 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA 2021), 2021, : 9368 - 9374
  • [45] Formal security analysis of Ariadne secure routing protocol using model checking
    Onem, E.
    Gurdag, A. Burak
    Caglayan, M. Ufuk
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 9 (01) : 12 - 24
  • [46] Architecture Design and Security Evaluation of Secure Optical Transport Network Using Formal Verification
    Maeda, Shion
    Nakabayashi, Misato
    Okuda, Tetsuya
    2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 1810 - 1815
  • [47] Formal Verification of PKMv3 Protocol Using DT-Spin
    Zhu, Xiaoran
    Xu, Yuanmin
    Guo, Jian
    Wu, Xi
    Zhu, Huibiao
    Miao, Weikai
    PROCEEDINGS 2015 INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING, 2015, : 71 - 78
  • [48] A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA
    Santiago, Sonia
    Escobar, Santiago
    Meadows, Catherine
    Meseguer, Jose
    SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 162 - 177
  • [49] Formal Verification of Authentication and Confidentiality for TACACS plus Security Protocol using Scyther
    Pradeep, R.
    Sunitha, N. R.
    Ravi, V
    Verma, Sushma
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [50] Formal specification and security verification of the IDKE protocol using FDR model checking
    Soltwisch, R
    Tegeler, F
    Hogrefe, D
    2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 329 - 334