Analysis of mobile authentication protocols by SVO logic

Abdullah Almuhaideb, Bala Srinivasan, Phu Dung Le, Campbell Wilson, Vishv M Malhotra

    Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

    2 Citations (Scopus)

    Abstract

    The next generation of mobile services makes it desirable for mobile users to be connected everywhere. Since these users usually in the move, roaming services are deployed to allow mobile users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed based on either two-party or three-party roaming structure to allow ubiquities mobile access authentication, however, limitations such as performance issues and security vulnerabilities still exist in these approaches. In this paper, we implemented a methodology for verifying authentication protocols based on SVO logic, which shows that our Passport/Visa protocols meet the desired authentication objectives and prove the protocols correctness. Moreover, we show that our proposal addresses existing limitations when compared to the other approaches.

    Original languageEnglish
    Title of host publicationProceedings - 1st International Conference on Security of Internet of Things, SecurIT 2012
    Subtitle of host publicationAugust 17-19, 2012, Amrita University, Amritapuri Campus, Kerala, India
    Place of PublicationNew York, New York
    PublisherAssociation for Computing Machinery (ACM)
    Pages126-134
    Number of pages9
    ISBN (Print)9781450318228
    DOIs
    Publication statusPublished - 2012
    EventInternational Conference on Security of Internet of Things 2012 - Kerala, India
    Duration: 17 Aug 201219 Aug 2012
    Conference number: 1st

    Conference

    ConferenceInternational Conference on Security of Internet of Things 2012
    Abbreviated titleSecurIT 2012
    Country/TerritoryIndia
    CityKerala
    Period17/08/1219/08/12

    Keywords

    • Authentications protocols
    • Formal methods
    • SVO modal logic
    • Ubiquitous networking
    • Wireless roaming

    Cite this