A Formally Verified Device Authentication Protocol Using Casper/FDR

For communication in Next Generation Networks, highly-developed mobile devices will enable users to store and manage a lot of credentials on their terminals. Furthermore, these terminals will represent and act on behalf of users when accessing different networks and connecting to a wide variety of services. In this situation, it is essential for users to trust their terminals and for all transactions using them to be secure. This paper analyses a number of the Authentication and Key Agreement protocols between the users and mobile terminals, then proposes a novel device authentication protocol. The proposed protocol is analysed and verified using a formal methods approach based on Casper/FDR compiler.

[1]  Failures-divergence Refinement Fdr2 User Manual , 2012 .

[2]  Praphul Chandra BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering) , 2005 .

[3]  Chin-Tser Huang,et al.  Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR , 2008, 2008 IEEE International Symposium on Wireless Communication Systems.

[4]  Jonathan Loo,et al.  A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR , 2012, EURASIP J. Wirel. Commun. Netw..

[5]  Takehiro Nakayama,et al.  Trusted Mobile Platform Technology for Secure Terminals , 2007 .

[6]  Fumiyuki Adachi,et al.  Scalable Mobile Ethernet and fast vertical handover , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[7]  Gavin Lowe,et al.  Casper: a compiler for the analysis of security protocols , 1997, Proceedings 10th Computer Security Foundations Workshop.

[8]  Michael Goldsmith,et al.  Modelling and analysis of security protocols , 2001 .

[9]  Praphul Chandra Security in Traditional Wireless Networks , 2005 .

[10]  Xiaohu Tang,et al.  AKA and Authorization Scheme for 4G Mobile Networks Based on Trusted Mobile Platform , 2005, 2005 5th International Conference on Information Communications & Signal Processing.

[11]  V. Valli Kumari,et al.  Formal Verification of IEEE802.11i WPA-GPG Authentication Protocol , 2011 .

[12]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[13]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .