Formal Analysis for Security of Otway-Rees Protocol with BAN Logic
2009 First International Workshop on Database Technology and Applications, 2009BAN logic can prove whether a protocol can reach expected target and find some flaws in the protocol. The paper analyzed constitute of BAN logic and analysis steps. On the basis of the above work, BAN logic was used to construct an ideal model of the Otway-Rees protocol and the security of the protocol was analyzed with the initial hypothesis and the ...
Li Tingyuan +3 more
openaire +1 more source
Secure Data Validation and Transmission in Cloud and IoT Through Ban Logic and KP-ABE
International Journal of Sensors, Wireless Communications and Control, 2022Background: Cloud computing is a service that is being accelerating its growth in the field of information technology in recent years. Privacy and security are challenging issues for cloud users and providers. Obective: This work aims at ensuring secured validation of user and protects data during transmission for users in a public IoT-cloud ...
Narander Kumar, Jitendra Kumar Samriya
openaire +1 more source
FORMAL VERIFICATION OF BUNDLE AUTHENTICATION MECHANISM IN OSGi SERVICE PLATFORM: BAN LOGIC
International Journal of Software Engineering and Knowledge Engineering, 2006Security is critical in a home gateway environment. Robust secure mechanisms must be put in place for protecting information transferred through a central location. In considering characteristics for the home gateway environment, this paper proposes a bundle authentication mechanism.
YOUNG-GAB KIM +3 more
openaire +1 more source
BAN Logic-Based Security Proof for Mobile OTP Authentication Scheme
2012A Mobile One-Time Password (OTP) mechanism solves the password security problem that could result from reusing the same password multiple times. Eldefrawy et al., has presented a two-factor OTP-based authentication scheme using mobile phones which provides forward and infinite OTP generation using two nested hash functions.
Mohammed Saeed Alkatheiri +2 more
openaire +1 more source
The study on the application of BAN logic in formal analysis of authentication protocols
Proceedings of the 7th international conference on Electronic commerce - ICEC '05, 2005The authentication protocol is the most fundamental and critical issue in network security and safety system and BAN logic is the most important tool to have a formalization analysis of authentication protocols. This paper first attempts to illustrate the basic methods for BAN logic analysis protocols by making a comparative study between two ...
Jinghua Wen, Mei Zhang, Xiang Li
openaire +1 more source
Security solutions against attacks in mobile ad hoc networks and their verification using BAN logic
2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017In the last few years, there has been tremendous interest in ad hoc wireless networks as they have massive military and commercial potential. An ad hoc wireless network serves as an independent network that comprises of mobile devices that utilize wireless transmission for communication, having no fixed infrastructure.
Mihir Saxena, Amit Dua
openaire +1 more source
One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication
2003In this paper we make a formal analysis of one-time password protocols using BAN logic and provide some guidelines to integrate securely one-time passwords with smartcard based authentication. We also propose some extensions to the BAN logic to facilitate analyzing hash chain based authentication protocols.
Bicakci, K, Baykal, Nazife
openaire +2 more sources
The existing Extensible Authentication Protocol (EAP) based handover authentication schemes have show robust security features especially the Qi Jing et al.'s design, which not only meets the essential security requirements in handover authentication but also achieves privacy preservation.
Li Ling Cao, Wan Cheng Ge
openaire +1 more source
A Security Analysis Approach for Secure Color-Code Key Exchange Protocol by Using BAN Logic
2020In, 2016, the first secure color-code key exchange (SCCKE) protocol for secure mobile chat applications (MC APPs) was proposed by Hsing-Chung Chen. However, his analyses only use the mathematic proof. He did not analyze the security strength by using Burrows-Abedi-Needham logic (also known as the BAN logic).
Hsing-Chung Chen +2 more
openaire +1 more source
A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic
2003A process following a security protocol is represented by a formal proof (of a fragment of linear logic based on the multiset rewriting model), modifying the idea by Cervesato-Durgin-Lincoln-Mitchell-Scedrov [4], while the (modified) BAN logic (which was first introduced by Burrows-Abadi-Needham [2]) is used as an evaluation semantics on security ...
Koji Hasebe, Mitsuhiro Okada
openaire +1 more source

