Formal Analysis of Authentication Protocol Based on Directed Graph Model

Author(s):  
Changchun Li ◽  
Kangnian Wang ◽  
Xingtao Zhu
2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Tsu-Yang Wu ◽  
Lei Yang ◽  
Zhiyuan Lee ◽  
Shu-Chuan Chu ◽  
Saru Kumari ◽  
...  

The wireless sensor network is a network composed of sensor nodes self-organizing through the application of wireless communication technology. The application of wireless sensor networks (WSNs) requires high security, but the transmission of sensitive data may be exposed to the adversary. Therefore, to guarantee the security of information transmission, researchers propose numerous security authentication protocols. Recently, Wu et al. proposed a new three-factor authentication protocol for WSNs. However, we find that their protocol cannot resist key compromise impersonation attacks and known session-specific temporary information attacks. Meanwhile, it also violates perfect forward secrecy and anonymity. To overcome the proposed attacks, this paper proposes an enhanced protocol in which the security is verified by the formal analysis and informal analysis, Burross-Abadii-Needham (BAN) logic, and ProVerif tools. The comparison of security and performance proves that our protocol has higher security and lower computational overhead.


2013 ◽  
Vol 401-403 ◽  
pp. 1864-1867 ◽  
Author(s):  
Li Ling Cao ◽  
Wan Cheng Ge

The existing Extensible Authentication Protocol (EAP) based handover authentication schemes have show robust security features especially the Qi Jing et al.'s design, which not only meets the essential security requirements in handover authentication but also achieves privacy preservation. However, it still suffers pitfalls in the process of authentication. The main idea of this paper is to extend the work by Qi Jing et al. and particularly focus on the formal analysis using extending BAN logic which is more concise yet practical to use on PKI-based protocols.


2013 ◽  
Vol 427-429 ◽  
pp. 2403-2407
Author(s):  
She Qiang Peng ◽  
Long Wang

To address the security problems caused by the fake readers, and the weakness of low authentication protocol efficiency, a new RFID security authentication protocol based on Hash function is proposed. The security ability of the protocol is compared with other protocols' and is proved by doing the formal analysis. The theoretical analysis and formal proof is presented to prove the security ability of the protocol. Consequently, the result showed that the new protocol could protect the data privacy, achieve the data synchronization, prevent the tag from location tracking, avoid information reproduction, prevent clone and counterfeit and possess forward security ability which was useful for low-cost tags.


Machines ◽  
2021 ◽  
Vol 9 (11) ◽  
pp. 290
Author(s):  
Yanjun Shi ◽  
Zhiheng Yuan ◽  
Hao Yu ◽  
Yijia Guo ◽  
Yuhan Qi

Connected and automated vehicles (CAVs) are a very promising alternative for reducing fuel consumption and improving traffic efficiency when vehicles merge at on-ramps. In this study, we propose a graph-based method to coordinate CAVs to merge at the highway ramp. First, the optimized vehicles were divided into groups to pass the merging point. Then we built a directed graph model for each group of vehicles, where each path of the graph corresponds to one of all possible merging sequences. The improved shortest path algorithm is proposed to find the optimal merging sequence for minimizing total fuel consumption. The results of the simulation showed that the proposed graph-based method reduced fuel consumption and ensured high traffic efficiency; moreover, the vehicles can form a platoon after passing the merge point.


2012 ◽  
Vol 433-440 ◽  
pp. 3683-3687
Author(s):  
Ling Tie ◽  
Di He

Proxy mobile ipv6 protocol is a mandatory protocol to support inter-working among heterogeneous mobile broadband networks. In order to support compatibility to IPv4 network, a mobility infrastructure in the proxy mobile ipv6 that provide ipv4 extension is presented in this article. An authentication protocol based on authentication option is proposed to protect this proxy mobile IPv6 protocol with IPv4 support. A SVO formal Analysis method is used to prove the security of this protocol.


Sign in / Sign up

Export Citation Format

Share Document