scispace - formally typeset
Search or ask a question

Showing papers on "Otway–Rees protocol published in 2016"


Journal ArticleDOI
01 Jan 2016
TL;DR: The proposed protocol not only resists the above mentioned security weaknesses, but also achieves complete security requirements including specially energy efficiency, user anonymity, mutual authentication and user-friendly password change phase.
Abstract: Wireless sensor networks can be deployed in any attended or unattended environments like environmental monitoring, agriculture, military, health care etc., where the sensor nodes forward the sensing data to the gateway node. As the sensor node has very limited battery power and cannot be recharged after deployment, it is very important to design a secure, effective and light weight user authentication and key agreement protocol for accessing the sensed data through the gateway node over insecure networks. Most recently, Turkanovic et?al. proposed a light weight user authentication and key agreement protocol for accessing the services of the WSNs environment and claimed that the same protocol is efficient in terms of security and complexities than related existing protocols. In this paper, we have demonstrated several security weaknesses of the Turkanovic et?al. protocol. Additionally, we have also illustrated that the authentication phase of the Turkanovic et?al. is not efficient in terms of security parameters. In order to fix the above mentioned security pitfalls, we have primarily designed a novel architecture for the WSNs environment and basing upon which a proposed scheme has been presented for user authentication and key agreement scheme. The security validation of the proposed protocol has done by using BAN logic, which ensures that the protocol achieves mutual authentication and session key agreement property securely between the entities involved. Moreover, the proposed scheme has simulated using well popular AVISPA security tool, whose simulation results show that the protocol is SAFE under OFMC and CL-AtSe models. Besides, several security issues informally confirm that the proposed protocol is well protected in terms of relevant security attacks including the above mentioned security pitfalls. The proposed protocol not only resists the above mentioned security weaknesses, but also achieves complete security requirements including specially energy efficiency, user anonymity, mutual authentication and user-friendly password change phase. Performance comparison section ensures that the protocol is relatively efficient in terms of complexities. The security and performance analysis makes the system so efficient that the proposed protocol can be implemented in real-life application.

260 citations


Journal ArticleDOI
TL;DR: The main intention of this paper is to design an efficient and robust smartcard-based user authentication and session key agreement protocol for wireless sensor networks that use the Internet of Things, and its security is analyzed, proving that it overcomes the weaknesses of Farash et?al.'s protocol.

240 citations


Journal ArticleDOI
TL;DR: This paper proposes to establish a taxonomy of the attacks against this protocol, considering three main categories including attacks targeting network resources, attacks modifying the network topology and attacks related to network traffic.
Abstract: The growing interest for the Internet of Things is contributing to the large-scale deployment of Low power and Lossy Networks (LLN). These networks support communications amongst objects from the real world, such as home automation devices and embedded sensors, and their interconnection to the Internet. An open standard routing protocol, called RPL, has been specified by the IETF in order to address the specific properties and constraints of these networks. However, this protocol is exposed to a large variety of attacks. Their consequences can be quite significant in terms of network performance and resources. In this paper, we propose to establish a taxonomy of the attacks against this protocol, considering three main categories including attacks targeting network resources, attacks modifying the network topology and attacks related to network traffic. We describe these attacks, analyze and compare their properties, discuss existing counter-measures and their usage from a risk management perspective.

198 citations


Journal ArticleDOI
TL;DR: This work proposes a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology using the widely-accepted Burrows-Abadi-Needham (BAN) logic and informal security analysis to prove that the protocol achieves the necessary security requirements and goals of an authentication service.

106 citations


Journal ArticleDOI
TL;DR: Experimental results on BitTorrent, CIFS/SMB, DNS, FTP, PPLIVE, SIP, and SMTP traces show that Securitas has the ability to accurately identify the network traces of the target application protocol with an average recall and an average precision of about 98.4%.
Abstract: Traffic classification, a mapping of traffic to network applications, is important for a variety of networking and security issues, such as network measurement, network monitoring, as well as the detection of malware activities. In this paper, we propose Securitas, a network trace-based protocol identification system, which exploits the semantic information in protocol message formats. Securitas requires no prior knowledge of protocol specifications. Deeming a protocol as a language between two processes, our approach is based upon the new insight that the n-grams of protocol traces, just like those of natural languages, exhibit highly skewed frequency-rank distribution that can be leveraged in the context of protocol identification. In Securitas, we first extract the statistical protocol message formats by clustering n-grams with the same semantics, and then use the corresponding statistical formats to classify raw network traces. Our tool involves the following key features: 1) applicable to both connection oriented protocols and connection less protocols; 2) suitable for both text and binary protocols; 3) no need to assemble IP packets into TCP or UDP flows; and 4) effective for both long-live flows and short-live flows. We implement Securitas and conduct extensive evaluations on real-world network traces containing both textual and binary protocols. Our experimental results on BitTorrent, CIFS/SMB, DNS, FTP, PPLIVE, SIP, and SMTP traces show that Securitas has the ability to accurately identify the network traces of the target application protocol with an average recall of about 97.4% and an average precision of about 98.4%. Our experimental results prove Securitas is a robust system, and meanwhile displaying a competitive performance in practice.

78 citations


Journal ArticleDOI
TL;DR: The informal and formal security analyses along with the performance analysis sections determine that the proposed protocol performs better than Memon et al.'s protocol and other related protocols in terms of security and efficiency.
Abstract: Mobile user authentication is an essential topic to consider in the current communications technology due to greater deployment of handheld devices and advanced technologies. Memon et al. recently proposed an efficient and secure two-factor authentication protocol for location-based services using asymmetric key cryptography. Unlike their claims, the vigilant analysis of this paper substantiates that Memon et al. ’s protocol has quite a few limitations such as vulnerability to key compromised impersonation attack, insecure password changing phase, imperfect mutual authentication, and vulnerability to insider attack. Furthermore, this paper proposes an enhanced secure authentication protocol for roaming services on elliptic curve cryptography. The proposed protocol is also a two-factor authentication protocol and is suitable for practical applications due to the composition of light-weight operations. The proposed protocol’s formal security is verified using Automated Validation of Internet Security Protocols and Applications tool to certify that the proposed protocol is free from security threats. The informal and formal security analyses along with the performance analysis sections determine that the proposed protocol performs better than Memon et al. ’s protocol and other related protocols in terms of security and efficiency.

76 citations


Journal ArticleDOI
TL;DR: It is shown that Das's scheme and its derivatives not only have security imperfections but also do not provide key agreement, and a novel user authentication scheme with key agreement for WSN is proposed, which is more robust and offers better security.
Abstract: Wireless sensor networks WSNs are getting popular for their deployment in unattended environments, where a registered user can log in to the network and access data collected from the desired sensor. Because of limited resources and computation power in sensor nodes, an authentication protocol should be simple and efficient. M.L. Das proposed a two-factor authentication scheme for WSNs. Because his scheme uses only one-way hash function and XOR operation, it is well suited for resource-constrained environments. Because of some flaws in Das's scheme, several improved schemes have been introduced. In this paper, we show that Das's scheme and its derivatives not only have security imperfections but also do not provide key agreement. To overcome their security shortcomings, we propose a novel user authentication scheme with key agreement for WSN. We furnish security analysis of the proposed protocol to show its robustness to various attacks as well as analyze its performance to determine its efficiency. We provide protocol analysis and verification of the proposed protocol. Compared with the existing schemes, it is more robust and offers better security. Copyright © 2012 John Wiley & Sons, Ltd.

68 citations


Journal ArticleDOI
TL;DR: To show the security of the proposed authentication scheme for session initiation protocol using smart card, it is proved its security in the random oracle model and it is shown that an adversary can easily masquerade as a legal server to fool users.
Abstract: Very recently, Tu et al. proposed an authentication scheme for session initiation protocol using smart card to overcome the security flaws of Zhang et al.’s protocol. They claimed that their protocol is secure against known security attacks. However, in this paper, we indicate that Tu et al.’s protocol is insecure against impersonation attack. We show that an adversary can easily masquerade as a legal server to fool users. As a remedy, we also improve Tu et al.’s protocol without imposing extra computation cost. To show the security of our protocol, we prove its security in the random oracle model.

65 citations


Journal ArticleDOI
TL;DR: This paper is the first to present DNP3 Secure Authentication for Broadcast (DNP3-SAB), a new lightweight security scheme for broadcast mode communication based on hash chain that reduces the communication overhead significantly at the cost of an increase with a constant term in processing and storage overhead.
Abstract: The Distributed Network Protocol version 3 (DNP3) provides Secure Authentication (DNP3-SA) as the mechanism to authenticate unicast messages from a master station to its outstations in supervisory control and data acquisition systems. In large-scale systems, it may be necessary to broadcast a critical request from a master station to multiple outstations at once. The DNP3 protocol standard describes the use of broadcast communication; however, it does not specify its security. This paper is the first to present DNP3 Secure Authentication for Broadcast (DNP3-SAB), a new lightweight security scheme for broadcast mode communication. This scheme is based on hash chain and only makes use of the existing cryptographic primitives specified in DNP3-SA. The scheme integrates itself into the DNP3-SA key update process. The proposed scheme is modeled, validated, and verified using colored Petri Nets against the most common protocol attacks such as modification, injection, and replay. Performance analysis on our scheme and the existing DNP3-SA modes (NACR and AGM) shows that DNP3-SAB reduces the communication overhead significantly at the cost of an increase with a constant term in processing and storage overhead. This benefit is maintained even when DNP3-SAB is under attack.

53 citations


Journal ArticleDOI
TL;DR: A novel chaotic maps-based user authentication with key agreement protocol for multi-server environments that is provably secure in the random oracle model under the chaotic-maps based computational Diffie-Hellman assumption and compared with Lee et al.
Abstract: The widespread popularity of the computer networks has triggered concerns about information security. Password-based user authentication with key agreement protocols have drawn attentions since it provides proper authentication of a user before granting access right to services, and then ensure secure communication over insecure channels. Recently, Lee et al. pointed out different security flaws on Tsaur et al.'s multi-server user authentication protocol, and they further proposed an extended chaotic maps-based user authentication with key agreement protocol for multi-server environments. However, we observed that Lee et al.'s protocol has some functionality and security flaws, i.e., it is inefficient in detection of unauthorized login and it does not support password change mechanism. Besides, their protocol is vulnerable to registration center spoofing attack and server spoofing attack. In order to remedy the aforementioned flaws, we proposed a novel chaotic maps-based user authentication with key agreement protocol for multi-server environments. The proposed protocol is provably secure in the random oracle model under the chaotic-maps based computational Diffie-Hellman assumption. In addition, we analyzed our protocol using BAN logic model. We also compared our protocol with Lee et al.'s protocol in aspects of computation cost, functionalities and securities.

42 citations


Journal ArticleDOI
10 May 2016-PLOS ONE
TL;DR: An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards is proposed and it is proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic.
Abstract: Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols.

Journal ArticleDOI
TL;DR: An improved secure password and chaos-based two-party key agreement protocol, which can solve the security threats of replay and denial-of-service attacks and simplify the protocol steps to reduce redundancy in protocol design.
Abstract: Recently, chaos has been treated as a good way to reduce computational complexity while satisfying security requirements of a key agreement protocol. Guo and Zhang (Inf Sci 180(20):4069–4074, 2010) proposed an chaotic public-key cryptosystem-based key agreement protocol. Lee (Inf Sci 290:63–71, 2015) has proved that Guo et al.’s scheme cannot resist off-line password guess attack. In this paper, we furtherly demonstrate Guo et al.’s scheme has redundancy in protocol design and still has some security flaws. Furthermore, we present an improved secure password and chaos-based two-party key agreement protocol, which can solve the security threats of replay and denial-of-service attacks. Meanwhile, we simplify the protocol steps to reduce redundancy in protocol design. From security and performance analysis, our proposed protocol can resist the security flaws in related works, and it has less communication overhead and computational complexity.

Proceedings ArticleDOI
01 Aug 2016
TL;DR: It is observed that high security in group proof construction is still infeasible, thus if security is required to be maximum then multi-round protocol should be preferred.
Abstract: Radio Frequency Identification (RFID) is an efficient technology for identification, tracking and group proof construction. The multi-round protocols for authentication and group proof construction increase the cost with increase in participants. In this work, computational and communication cost of multi-round protocol is calculated to identify the protocol with least cost and high security. The computational cost is computed using number of rounds and messages, Message Authentication Code (MACO) operations, messages sent per participant and messages received per participant. The communication cost is computed using size of message sent and size of message received. In order to reduce the computational and communication cost, two lightweight group authentication protocols are selected for refinement. The protocols are: Juel's protocol, and Saito and Sakurai protocol. Three refinements are proposed which convert these protocols from two-party group construction to n-party group construction. Results show that refinements reduce the cost compared to Juel's protocol and Saito and Sakurai's protocol. It is observed that high security in group proof construction is still infeasible, thus if security is required to be maximum then multi-round protocol should be preferred. In this work, a multi-round authentication protocol of [1] is analyzed for comparative security analysis. Simulation analysis shows that performance of proposed authentication protocol in multi-round category as well as single-round category is better than state-of-art protocols.

Journal ArticleDOI
TL;DR: In this article, the authors present a formal model for the behavioural analysis of DNP3-SA using Coloured Petri Nets (CPN), which is capable of testing and verifying various attack scenarios: modification, replay and spoofing.

Proceedings ArticleDOI
01 Sep 2016
TL;DR: This paper challenges the claim that this three-factor authenticated protocol for IoT networks is vulnerable against the replay attack and DoS attack, and proposes a secure authenticated key exchange protocol with the same assumptions.
Abstract: Internet of Things (IoT) is a network of objects which enables them to collect vital information. As a result, privacy and anonymity in IoT are the most important issues. So far, many protocols have been proposed to provide authentication mechanism in IoT networks. Recently, Amin et al proposed a three-factor authenticated protocol for IoT networks that is claimed to be secure. In this paper, we challenge this claim and show that this protocol is vulnerable against the replay attack and DoS attack. Moreover, inspired by this protocol, we propose a secure authenticated key exchange protocol with the same assumptions. Our analysis shows that our proposed protocol is more efficient than Amin et al protocol.

Journal ArticleDOI
TL;DR: A two-factor multi-server authentication protocol is proposed by Leu and Hsieh and it is observed that the forgery attack and the off-line password-guessing attack can be made on it.
Abstract: At the present time, application of online communication systems are rapidly increasing and most of the clients depend on a set of servers to fulfill their daily needs In order to access these servers, a client user needs to register to each server with different login credentials To circumvent this situation, the concept of multi-server authentication has been adopted, where a user can access all the servers using a single login credential In this paper, a two-factor multi-server authentication protocol, which is proposed by Leu and Hsieh, is analyzed and observed that the forgery attack and the off-line password-guessing attack can be made on it Further, the off-line password-guessing attack and other security threats are found in similar kind of multi-server authentication protocol, which is designed by Li et al This paper mainly focuses on enhancing the securities of the previously mentioned protocols and thus proposed a new protocol We have employed formal and informal security analysis to analyze the proposed protocol The performance of our protocol is also compared with the related protocols It can also be noted that the designed protocol accomplishes mutual authentication, session key verification, and identity and password change phases Copyright © 2016 John Wiley & Sons, Ltd

Journal ArticleDOI
TL;DR: This study presented an efficient design of identity‐based handover authentication protocol for wireless mobile networks under the prime‐order elliptic curve cryptosystem and is examined to be more efficient from the size of the security parameter and computation costs than the previous protocols.
Abstract: This study presented an efficient design of identity-based handover authentication protocol for wireless mobile networks under the prime-order elliptic curve cryptosystem. The present work does not include the time-consuming and expensive bilinear pairing and map-to-point hash functions. The proposed protocol is analyzed in the random oracle model and also demonstrated to have other security properties, including protection against replay attack and denial-of-service attack, user anonymity and unlinkability, subscription validation, conditional privacy preservation, and mutual authentication. Our handover authentication protocol is examined to be more efficient from the size of the security parameter and computation costs than the previous protocols. Copyright © 2014 John Wiley & Sons, Ltd.

Journal ArticleDOI
TL;DR: The proposed protocol is lightweight and perfectly suitable for real-time applications as it accomplishes simple one-way hash function, message authentication code and exclusive-OR operation and achieves all the eminent security properties and is resistant to various possible attacks.
Abstract: In 2012, Mun et al. proposed an enhanced secure authentication with key-agreement protocol for roaming service in global mobility networks environment based on elliptic curve cryptography. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful analysis of this study proves that Mun et al. 's protocol is susceptible to several attacks such as replay attack, man-in-middle attack, user impersonation attack, privileged insider attack, denial-of-service attack, no login phase and imperfect mutual authentication phase. In addition, this study proposes an enhanced lightweight authentication with key-agreement protocol for mobile networks based on elliptic curve cryptography using smart cards. The proposed protocol is lightweight and perfectly suitable for real-time applications as it accomplishes simple one-way hash function, message authentication code and exclusive-OR operation. Furthermore, it achieves all the eminent security properties and is resistant to various possible attacks. The security analysis and comparison section demonstrates that the proposed protocol is robust compared with Mun et al. 's protocol.

Journal ArticleDOI
TL;DR: This study proposes an energy efficient authentication protocol for SIP by using smartcards based on elliptic curve cryptography that can resist various attacks and provides efficient password updating.

Journal ArticleDOI
TL;DR: This paper verifies the safety of the proposed authentication protocol against a range of attacks using a model checking program, Casper/FDR program, to be safe and secure against diverse attacks.
Abstract: Internet of things technology has recently drawn much attention across industries. IoT technology has gradually been applied to industries and everyday life in general including healthcare, where people can access hospital information systems to view personal health and medical information. Still, due to security vulnerabilities, personal health and medical information is prone to hacking attacks. Thus, concerns over privacy invasion have come to the fore, and at the same time security issues are considered to override information services. This paper proposes a communication protocol based on hash lock, session keys, random numbers and security keys designed to be safe against intruders' hacking attempts in information communication between medical devices. Instead of arguing for the safety of the proposed protocol with mathematical theorem proving as in prior research on protocol proving, this paper verifies the safety of the proposed authentication protocol against a range of attacks using a model checking program, Casper/FDR program. In brief, the proposed communication protocol for medical devices is safe and secure against diverse attacks.

Book ChapterDOI
20 Sep 2016
TL;DR: This paper formally study the security of one of the most used industrial protocols: OPC-UA using ProVerif, a well known cryptographic protocol verification tool, and finds several attacks on the protocols and provides countermeasures.
Abstract: Industrial systems are publicly the target of cyberattacks since Stuxnet [1]. Nowadays they are increasingly communicating over insecure media such as Internet. Due to their interaction with the real world, it is crucial to prove the security of their protocols. In this paper, we formally study the security of one of the most used industrial protocols: OPC-UA. Using ProVerif, a well known cryptographic protocol verification tool, we are able to check secrecy and authentication properties. We find several attacks on the protocols and provide countermeasures.

Proceedings ArticleDOI
01 Dec 2016
TL;DR: An efficient and lightweight authentication protocol using Elliptical Curve Cryptography (ECC) is found to be safe as it establishes mutual authentication between the server and tags; while protecting against replay, tracking, eavesdropping, and cloning risks.
Abstract: Radio Frequency Identification(RFID) is a leading wireless technology with respect to Automatic Identification and Data Capture(AIDC). With its increasing popularity amongst the researchers and industries, it has been successful in paving its way to various domains including supply chain management, healthcare, agriculture, aviation, etc. Potential applications of RFID range from tracking of assets to real-time human monitoring. However, with its wide-scale deployment, RFID systems have become more vulnerable to different kinds of active and passive attacks leading to various issues such as information leakage, identity revelation, spoofing, tracking, etc. Thus, privacy needs to be embedded in such systems so as to maintain highest levels of privacy and authenticity at all times. In order to address these issues, this paper proposes an efficient and lightweight authentication protocol using Elliptical Curve Cryptography(ECC). It is found to be safe as it establishes mutual authentication between the server and tags; while protecting against replay, tracking, eavesdropping, and cloning risks. In addition to this, AVISPA has been used to formally verify the security features of the protocol. The obtained results indicate that it is more preferable for RFID- enabled devices and provides better security than its previous counterparts.

Journal ArticleDOI
TL;DR: The TTP-based high-efficient multi-key exchange protocol (THMEP), is proposed to provide users with a secure and efficient protocol, which employs the elliptic curve cryptography, a 2-D operation, and a current time encryption key, to exchange their session keys.
Abstract: With a trusted-third-party (TTP)-based key exchange protocol, when a user would like to transmit a message to another user, the transmitted data are encrypted by a session key exchanged between the two ends of the corresponding connection with the help of the TTP. Up to present, due to the assistance of a TTP, this type of protocols has performed well in protecting messages delivered between two authorized users. Even this, inflexibility, unreliability, and inefficiency problems still exist in these previously proposed protocols. Therefore, in this paper, a multi-key exchange protocol, named the TTP-based high-efficient multi-key exchange protocol (THMEP), is proposed to provide users with a secure and efficient protocol, which employs the elliptic curve cryptography, a 2-D operation, and a current time encryption key, to exchange their session keys. The proposed protocol not only effectively hides important encryption parameters, but also achieves fully mutual authentication between a user and his/her trusted server. It can resist known-key, impersonation, replay, eavesdropping, and forgery attacks. Besides, the THMEP generates 40 session keys in a key exchange process, meaning the proposed protocol can support 40 sessions simultaneously. It also shortens the processing time, which is 3.78 times faster than that of a specific previous study. Its security level and performance are higher than those of the compared state-of-the-art protocols. In other words, the THMEP is very suitable for IoT applications.

Journal ArticleDOI
TL;DR: Experimental results show that the proposed authentication protocol improves the security level and the resource consumption of devices, and is based on a keyed hash algorithm.
Abstract: Wireless network devices are used for the Internet of Things in a variety of applications, and although the IoT has many benefits, there are some security issues in this area. Hacking tools that are widely used in wireless communication enable the attacker to export the information stored in the device memory. Devices within the IoT should not allow this information to be accessed without an authentication. In this paper, we propose an efficient device authentication protocol without certification authority for the Internet of Things. Compared to the existing Constrained Application Protocol, the proposed protocol increases efficiency by minimizing the number of message exchanges. Since our protocol is based on a keyed hash algorithm, the Certificate of Authority is not required. Experimental results show that the proposed authentication protocol improves the security level and reduces the resource consumption of devices.

Proceedings ArticleDOI
01 Aug 2016
TL;DR: By combining with CAN data compression algorithm, it is shown that the efficiency of the proposed algorithm can be significantly increased and the results indicate that the proposed security protocol is suitable for use in real-time in-vehicle system.
Abstract: Controller area network (CAN) is the most extensively used embedded network protocol in vehicles. However, CAN is vulnerable to malicious security attacks as it enables unauthorized access in a relatively straightforward manner. In the last ten years, security attacks in vehicles have been increasing and reported in several documents. In this paper, we propose a security protocol for CAN system based on AES-128 encryption and HMAC function. In addition, by combining with CAN data compression algorithm, it is shown that the efficiency of the proposed algorithm can be significantly increased. We simulate the proposed security protocol using the CANoe software. The CAN bus load is measured using CANcaseXL device. Experimental results show that the average message delay with 20 ECUs is within 0.13ms and the bus load can be reduced by 18.41% using the proposed security protocol compared with the uncompressed message. Our results indicate that the proposed security protocol is suitable for use in real-time in-vehicle system.

Journal ArticleDOI
TL;DR: This paper proposes a novel approach to determine the optimal length of protocol keywords and recover message formats of Internet protocols by maximizing the likelihood probability of message segmentation and keyword selection.
Abstract: With the rapid development of Internet, especially the mobile Internet, the new applications or network attacks emerge in a high rate in recent years. More and more traffic becomes unknown due to the lack of protocol specifications about the newly emerging applications. Automatic protocol reverse engineering is a promising solution for understanding this unknown traffic and recovering its protocol specification. One challenge of protocol reverse engineering is to determine the length of protocol keywords and message fields. Existing algorithms are designed to select the longest substrings as protocol keywords, which is an empirical way to decide the length of protocol keywords. In this paper, we propose a novel approach to determine the optimal length of protocol keywords and recover message formats of Internet protocols by maximizing the likelihood probability of message segmentation and keyword selection. A hidden semi-Markov model is presented to model the protocol message format. An affinity propagation mechanism based clustering technique is introduced to determine the message type. The proposed method is applied to identify network traffic and compare the results with existing algorithm.

Journal ArticleDOI
TL;DR: This study employs biometrics to design a lightweight privacy preserving authentication protocol for SIP based on symmetric encryption that can fully protect the privacy of biometric characteristics and data identity.
Abstract: Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is sought to enhance the security of SIP. Several attempts have been made to address the tradeoff problem between security and efficiency, but designing a successful authenticated key agreement protocol for SIP is still a challenging task from the viewpoint of both performance and security, because performance and security as two critical factors affecting SIP applications always seem contradictory. In this study, we employ biometrics to design a lightweight privacy preserving authentication protocol for SIP based on symmetric encryption, achieving a delicate balance between performance and security. In addition, the proposed authentication protocol can fully protect the privacy of biometric characteristics and data identity, which has not been considered in previous work. The completeness of the proposed protocol is demonstrated by Gong, Needham, and Yahalom (GNY) logic. Performance analysis shows that our proposed protocol increases efficiency significantly in comparison with other related protocols.

Proceedings ArticleDOI
03 Mar 2016
TL;DR: This work designs an extended authentication protocol and shows that it resists all known attacks, and compares with Cheng et al.'s protocol, which does not hold mutual authentication property.
Abstract: In the password based authenticated protocol, protecting off-line guessing attack is quite intricate owing to its low entropy property. In order to withstand it, three-factor (e.g., biometric, smartcard and password) authentication now becoming an important research paradigm in information security. Cheng et al.'s suggested an authenticated and key negotiation protocol using biometric and Quadratic Residue Problem (QRP), and they claim that it is robust against known attacks. However, our careful observation demonstrates that the protocol endures from a variety of security loopholes. We further observed that the protocol does not hold mutual authentication property. To conquer the security vulnerability, we aim to design an extended authentication protocol. The results obtained from AVISPA simulation assuarence against the security attacks. Further cryptanalysis on our scheme shows that it resists all known attacks. We found satisfactory results by comparing with Cheng et al.'s protocol.

Posted Content
TL;DR: A secure and trusted channel protocol that satisfies the stated security and operational requirements for an AWN protocol and is efficient for both the initial start-up of the network and when resuming a session after a cold and/or warm restart of a node.
Abstract: Avionics networks rely on a set of stringent reliability and safety requirements. In existing deployments, these networks are based on a wired technology, which supports these requirements. Furthermore, this technology simplifies the security management of the network since certain assumptions can be safely made, including the inability of an attacker to access the network, and the fact that it is almost impossible for an attacker to introduce a node into the network. The proposal for Avionics Wireless Networks (AWNs), currently under development by multiple aerospace working groups, promises a reduction in the complexity of electrical wiring harness design and fabrication, a reduction in the total weight of wires, increased customization possibilities, and the capacity to monitor otherwise inaccessible moving or rotating aircraft parts such as landing gear and some sections of the aircraft engines. While providing these benefits, the AWN must ensure that it provides levels of safety that are at minimum equivalent to those offered by the wired equivalent. In this paper, we propose a secure and trusted channel protocol that satisfies the stated security and operational requirements for an AWN protocol. There are three main objectives for this protocol. First, the protocol has to provide the assurance that all communicating entities can trust each other, and can trust their internal (secure) software and hardware states. Second, the protocol has to establish a fair key exchange between all communicating entities so as to provide a secure channel. Finally, the third objective is to be efficient for both the initial start-up of the network and when resuming a session after a cold and/or warm restart of a node. The proposed protocol is implemented and performance measurements are presented based on this implementation. In addition, we formally verify our proposed protocol using CasperFDR.

Journal ArticleDOI
TL;DR: This paper modeled the information flow of xDAuth protocol using high-level Petri nets to understand the protocol information flow in a distributed environment and formal analysis and verification results reveal the fact that the protocol fulfills its intended purpose and provides the security for the defined protocol specific properties.
Abstract: Service-oriented architecture offers a flexible paradigm for information flow among collaborating organizations. As information moves out of an organization boundary, various security concerns may arise, such as confidentiality, integrity, and authenticity that needs to be addressed. Moreover, verifying the correctness of the communication protocol is also an important factor. This paper focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios. We have modeled the information flow of xDAuth protocol using high-level Petri nets to understand the protocol information flow in a distributed environment. We analyze the rules of information flow using Z language, while Z3 SMT solver is used for the verification of the model. Our formal analysis and verification results reveal the fact that the protocol fulfills its intended purpose and provides the security for the defined protocol specific properties, e.g., secure secret key authentication, and Chinese wall security policy and secrecy specific properties, e.g., confidentiality, integrity, and authenticity.