Formal analysis of device authentication applications in ubiquitous computing
Author(s) -
William R. Claycomb,
Dongwan Shin
Publication year - 2011
Publication title -
osti oai (u.s. department of energy office of scientific and technical information)
Language(s) - English
Resource type - Conference proceedings
DOI - 10.1145/1982185.1982282
Subject(s) - computer science , authentication (law) , computer security , authentication protocol , ubiquitous computing , channel (broadcasting) , mobile device , message authentication code , computer network , cryptography , world wide web , human–computer interaction
Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom