Conference Paper

A Formally Verified Device Authentication Protocol Using Casper/FDR

DOI: 10.1109/TrustCom.2012.27 Conference: Trust comm


For communication in Next Generation Networks,
highly-developed mobile devices will enable users to store and
manage a lot of credentials on their terminals. Furthermore,
these terminals will represent and act on behalf of users when
accessing different networks and connecting to a wide variety
of services. In this situation, it is essential for users to trust
their terminals and for all transactions using them to be
secure. This paper analyses a number of the Authentication
and Key Agreement protocols between the users and mobile
terminals, then proposes a novel device authentication protocol.
The proposed protocol is analysed and verified using a formal
methods approach based on Casper/FDR compiler

Download full-text


Available from: Mahdi Aiash,
  • Source

    03/2012, Degree: Doctor of Philosophy- PhD
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Unlike current closed systems such as 2 nd and 3 rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network operators will support ubiquitous connectivity and thus enhances users' experience. However, this brings to the fore certain security issues which must be addressed, the most important of which is the initial Authentication and Key Agreement (AKA) to identify and authorize mobile nodes on these various networks. This paper looks at how existing research efforts the HOKEY WG, Mobile Ethernet and 3GPP frameworks respond to this new environment and provide security mechanisms. The analysis shows that most of the research had realized the openness of the core network and tried to deal with it using different methods. These methods will be extensively analysed in order to highlight their strengths and weaknesses.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The Locator/ID Separation Protocol (LISP) is routing architecture that provides new semantics for IP addressing. In order to simplify routing operations and improve scalability in future Internet, the LISP separates the device identity from its location, into two different numbering spaces. The LISP also, introduces mapping protocol mechanisms to match the two spaces. This paper analyses the security and functionality of the LISP mapping procedure using formal methods approach based on Casper/FDR tool. The analysis points out several security issues in the current protocol and proposes changes that are compatible with the implementation of LISP.
    The 7th International Conference on Network and System Security (NSS 2013); 06/2013
Show more