scholarly journals Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA

2020 ◽  
Vol 167 ◽  
pp. 1334-1344
Author(s):  
Patil Rachana Yogesh ◽  
Devane Satish R
Author(s):  
YOUNG-GAB KIM ◽  
CHANG-JOO MOON ◽  
DONGWON JEONG ◽  
DOO-KWON BAIK

Security is critical in a home gateway environment. Robust secure mechanisms must be put in place for protecting information transferred through a central location. In considering characteristics for the home gateway environment, this paper proposes a bundle authentication mechanism. We designed the exchange mechanism for transferring a shared secret key. This transports a service bundle safely in the bootstrapping step, by recognizing and initializing various components. In this paper, we propose a bundle authentication mechanism based on a MAC that uses a shared secret key created in the bootstrapping step. In addition, we verify the safety of the key exchange mechanism and bundle authentication mechanism using BAN Logic. From the verified result, we achieved goals of authentication. That is, the operator can trust the bundle provided by the service provider. The user who uses the service gateway can also express trust and use the bundle provided by the operator.


2019 ◽  
Vol 6 (1) ◽  
pp. 107 ◽  
Author(s):  
Esti Rahmawati Agustina ◽  
Magdalena Christine ◽  
Irma Fitriani

<p>Pemilihan Umum (pemilu) di Indonesia merupakan peristiwa yang sangat penting mengingat Indonesia merupakan negara yang menganut paham demokrasi. Metode yang digunakan dalam pemilihan umum di Indonesia adalah dengan menggunakan kertas suara yang ditandai yaitu dicentang atau dicoblos. Banyak kelemahan dan kecurangan yang terjadi dalam sistem konvensional ini. Misalnya pemilih ganda, data pemilih tidak valid, surat suara rusak dan lain sebagainya. Salah satu solusi untuk menyelesaikan permasalahan pada sistem pemilu konvensional adalah dengan menerapkan <em>electronic voting </em>(<em>e-voting</em>). Berbagai penelitian dan pengembangan dilakukan dalam rangka membangun sistem <em>e-voting </em>yang aman<em>.</em> Salah satunya adalah dengan mengimplementasikan teknik kriptografi. Salah satu protokol <em>e-voting</em> yang menerapkan teknik kriptografi adalah protokol <em>CryptO-0N2.</em> Pada perkembangannya, protokol ini telah dianalisis dengan menggunakan verifikasi formal berbasis pendekatan logika yaitu <em>BAN Logic</em>. Verifikasi formal terhadap suatu protokol dapat dijamin obyektivitasnya dengan menggunakan <em>tools </em>tertentu. Pada paper ini disajikan analisis protokol <em>CryptO-0N2</em> dengan menggunakan <em>Scyther Tool</em>. <em>Tool </em>ini memeriksa klaim <em>secrecy</em> dan <em>authentication</em> dari protokol <em>CryptO-0N2.</em> Hasil menunjukkan dari 17 klaim (<em>secrecy</em> dan <em>authentication</em>) terdapat 10 klaim sukses dan 7 klaim gagal.</p><p><em><strong>Abstract</strong></em></p><p class="Abstract"><em>Elections in Indonesia is a very important event considering Indonesia is a democratic country. The method of the general election in Indonesia is use a marked ballot that is ticked or punched. Many weaknesses and frauds occur in this conventional system. For example multiple voters, invalid voter data, broken ballots and so forth. One solution to solve the problems in conventional electoral systems is to apply electronic voting (e-voting). Various research and development carried out in order to build a secure e-voting system. One of them is by implementing cryptographic techniques. One of the e-voting protocols employing cryptographic techniques is the CryptO-0N2 protocol. In its development, this protocol has been analyzed by using formal logic-approach based on logical verification that is BAN Logic. Formal verification of a protocol can be guaranteed objectivity by using certain tools. In this paper we present CryptO-0N2 protocol analysis using Scyther Tool. This tool examines the secrecy and authentication claims of the CryptO-0N2 protocol. The result shows from 17 claims (secrecy and authentication) there are 10 successful claims and 7 claims are failed.</em></p><p><strong><br /></strong></p>


Author(s):  
Pierre-Loïc Garoche

The verification of control system software is critical to a host of technologies and industries, from aeronautics and medical technology to the cars we drive. The failure of controller software can cost people their lives. This book provides control engineers and computer scientists with an introduction to the formal techniques for analyzing and verifying this important class of software. Too often, control engineers are unaware of the issues surrounding the verification of software, while computer scientists tend to be unfamiliar with the specificities of controller software. The book provides a unified approach that is geared to graduate students in both fields, covering formal verification methods as well as the design and verification of controllers. It presents a wealth of new verification techniques for performing exhaustive analysis of controller software. These include new means to compute nonlinear invariants, the use of convex optimization tools, and methods for dealing with numerical imprecisions such as floating point computations occurring in the analyzed software. As the autonomy of critical systems continues to increase—as evidenced by autonomous cars, drones, and satellites and landers—the numerical functions in these systems are growing ever more advanced. The techniques presented here are essential to support the formal analysis of the controller software being used in these new and emerging technologies.


2001 ◽  
Author(s):  
Anand Chavan ◽  
Byoung Woo Min ◽  
Shiu-Kai Chin

Data ◽  
2021 ◽  
Vol 6 (7) ◽  
pp. 71
Author(s):  
Gonçalo Carnaz ◽  
Mário Antunes ◽  
Vitor Beires Nogueira

Criminal investigations collect and analyze the facts related to a crime, from which the investigators can deduce evidence to be used in court. It is a multidisciplinary and applied science, which includes interviews, interrogations, evidence collection, preservation of the chain of custody, and other methods and techniques of investigation. These techniques produce both digital and paper documents that have to be carefully analyzed to identify correlations and interactions among suspects, places, license plates, and other entities that are mentioned in the investigation. The computerized processing of these documents is a helping hand to the criminal investigation, as it allows the automatic identification of entities and their relations, being some of which difficult to identify manually. There exists a wide set of dedicated tools, but they have a major limitation: they are unable to process criminal reports in the Portuguese language, as an annotated corpus for that purpose does not exist. This paper presents an annotated corpus, composed of a collection of anonymized crime-related documents, which were extracted from official and open sources. The dataset was produced as the result of an exploratory initiative to collect crime-related data from websites and conditioned-access police reports. The dataset was evaluated and a mean precision of 0.808, recall of 0.722, and F1-score of 0.733 were obtained with the classification of the annotated named-entities present in the crime-related documents. This corpus can be employed to benchmark Machine Learning (ML) and Natural Language Processing (NLP) methods and tools to detect and correlate entities in the documents. Some examples are sentence detection, named-entity recognition, and identification of terms related to the criminal domain.


Sign in / Sign up

Export Citation Format

Share Document