Title :
Analysis and Modification of ASK Mobile Security Protocol
Author :
Kim, Il-Gon ; Kim, Hyun-Seok ; Lee, Ji-Yeon ; Choi, Jin-Young
Author_Institution :
Dept. of Comput. Sci. & Eng., Korea Univ., Seoul
Abstract :
Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification approach, we propose a modification, and then show that the new protocol is secure against replay attack
Keywords :
formal verification; mobile computing; protocols; security of data; ASK mobile security protocol; formal verification; protocol verification; replay attack; security protocol analysis; security protocol modification; Amplitude shift keying; Authentication; Computer networks; Formal verification; Information security; Mobile communication; Mobile computing; Safety; Wireless application protocol; Wireless networks;
Conference_Titel :
Mobile Commerce and Services, 2005. WMCS '05. The Second IEEE International Workshop on
Conference_Location :
Munich
Print_ISBN :
0-7695-2391-9
DOI :
10.1109/WMCS.2005.4