scholarly journals Security Properties of Gait for Mobile Device Pairing

2020 ◽  
Vol 19 (3) ◽  
pp. 697-710 ◽  
Author(s):  
Arne Brusch ◽  
Ngu Nguyen ◽  
Dominik Schurmann ◽  
Stephan Sigg ◽  
Lars Wolf
2019 ◽  
Vol 63 (8) ◽  
pp. 1168-1193
Author(s):  
M Magdalena Payeras-Capella ◽  
Macia Mut-Puigserver ◽  
Pau Conejero-Alberola ◽  
Jordi Castella-Roca ◽  
Llorenç Huguet-Rotger

Abstract Touristic City Cards are managed by some city councils in order to make a step toward the SmartCity concept. Touristic City Cards enable the integration of different touristic services so as to facilitate the access to transport, cultural sites and touristic attractions to visitors. In this paper, we introduce a secure mobile system called mCityPASS that allows the smart management and secure access to this kind of service. We have implemented the system in a smartphone platform in such a way that the mobile device contains the purchased access element that holds a set of e-tickets that enables the visitors of a city to make use of the specified touristic services. The paper presents the details of the whole implementation of the system and an evaluation of the performance and the effectiveness of it. Also, an analysis of the privacy and the security properties of the presented scheme has been conducted. As a result, we can assure that the system preserves the privacy of the tourists and fulfills the more challenging security properties: fairness, non-overspending, exculpability, unsplittability and selective reusability.


2022 ◽  
Vol 54 (9) ◽  
pp. 1-35
Author(s):  
René Mayrhofer ◽  
Stephan Sigg

Mobile device authentication has been a highly active research topic for over 10 years, with a vast range of methods proposed and analyzed. In related areas, such as secure channel protocols, remote authentication, or desktop user authentication, strong, systematic, and increasingly formal threat models have been established and are used to qualitatively compare different methods. However, the analysis of mobile device authentication is often based on weak adversary models, suggesting overly optimistic results on their respective security. In this article, we introduce a new classification of adversaries to better analyze and compare mobile device authentication methods. We apply this classification to a systematic literature survey. The survey shows that security is still an afterthought and that most proposed protocols lack a comprehensive security analysis. The proposed classification of adversaries provides a strong and practical adversary model that offers a comparable and transparent classification of security properties in mobile device authentication.


2021 ◽  
Vol 2021 ◽  
pp. 1-30
Author(s):  
Sameh Khalfaoui ◽  
Jean Leneutre ◽  
Arthur Villard ◽  
Jingxuan Ma ◽  
Pascal Urien

Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT devices. In order to provide the most user-friendly IoT services, the usability assessment has become the main requirement. Thus, the complete security analysis has been replaced by a sketch of a proof to partially validate the robustness of the proposal. The few existing formal or computational security verifications on the SDP schemes have been conducted based on the assessment of a wide variety of uniquely defined security properties. Therefore, the security comparison between these protocols is not feasible and there is a lack of a unified security analysis framework to assess these pairing techniques. In this paper, we survey a selection of secure device pairing proposals that have been formally or computationally verified. We present a systematic description of the protocol assumptions, the adopted verification model, and an assessment of the verification results. In addition, we normalize the used taxonomy in order to enhance the understanding of these security validations. Furthermore, we refine the adversary capabilities on the out-of-band channel by redefining the replay capability and by introducing a new notion of delay that is dependent on the protocol structure that is more adequate for the ad hoc pairing context. Also, we propose a classification of a number of out-of-band channels based on their security properties and under our refined adversary model. Our work motivates the future SDP protocol designer to conduct a formal or a computational security assessment to allow the comparability between these pairing techniques. Furthermore, it provides a realistic abstraction of the adversary capabilities on the out-of-band channel which improves the modeling of their security characteristics in the protocol verification tools.


2012 ◽  
Author(s):  
Judith E. Gold ◽  
Feroze B. Mohamed ◽  
Sayed Ali ◽  
Mary F. Barbe
Keyword(s):  

2020 ◽  
Vol 5 (1) ◽  
pp. 89
Author(s):  
Nasirudin Nasirudin ◽  
Sunardi Sunardi ◽  
Imam Riadi

Technological advances are growing rapidly, including mobile device technology, one of which is an Android smartphone that is experiencing rapid progress with a variety of features so that it can spoil its users, with the rapid development of smartphone technology, many users benefit, but many are disadvantaged by the growing smartphone. technology, so that many perpetrators or persons who commit crimes and seek profits with smartphone facilities. Case simulation by securing Samsung Galaxy A8 brand android smartphone evidence using the MOBILedit forensic express forensic tool with the National Institute of Standards and Technology (NIST) method which consists of four stages of collection, examination, analysis and reporting. The results of testing the Samsung Galaxy A8 android smartphone are carried out with the NIST method and the MOBILedit Forensic Express tool obtained by data backup, extraction and analysis so that there are findings sought for investigation and evidence of crimes committed by persons using android smartphone facilities.


Sign in / Sign up

Export Citation Format

Share Document