Security Analysis Based on BAN Logic

Author(s):  
Tao Shang ◽  
Jianwei Liu
Keyword(s):  
2014 ◽  
Vol 513-517 ◽  
pp. 1289-1293 ◽  
Author(s):  
Si Min Liu ◽  
Jun Yao Ye ◽  
Ying Lian Wang

This paper researched on Needham-Schroeder symmetric key authentication protocol based on BAN logic. It pointed out the flaw of the protocol which can be used by replay attack and improved the protocol by adding nonce in the transferred message. Then it listed the improved NS authentication protocol. Finally, this paper proved the improved protocol successful and available with BAN logic.


2021 ◽  
Vol 2021 ◽  
pp. 1-14 ◽  
Author(s):  
Tsu-Yang Wu ◽  
Lei Yang ◽  
Zhiyuan Lee ◽  
Chien-Ming Chen ◽  
Jeng-Shyang Pan ◽  
...  

A multiserver environment can improve the efficiency of mobile network services more effectively than a single server in managing the increase in users. Because of the large number of users, the security of users’ personal information and communication information is more important in a multiserver environment. Recently, Wang et al. proposed a multiserver authentication scheme based on biometrics and proved the security of their scheme. However, we first demonstrate that their scheme is insecure against a known session-specific temporary information attacks, user impersonation attacks, and server impersonation attacks. To solve the security weakness, we propose an improved scheme based on Wang et al.’s scheme. The security of our improved scheme is also validated based on the formal security analysis, Burrows–Abadi–Needham (BAN) logic, ProVerif, and informal security analysis. Security and performance comparisons prove the security and efficiency of our scheme.


Author(s):  
Xu Shiwei ◽  
Zhang Huanguo ◽  
Yan Fei ◽  
Xu Mingdi ◽  
Li Zhide
Keyword(s):  

2020 ◽  
Vol 25 (3) ◽  
pp. 1162-1173 ◽  
Author(s):  
Yuan Fei ◽  
Huibiao Zhu ◽  
Phan Cong Vinh

Sign in / Sign up

Export Citation Format

Share Document