z-logo
open-access-imgOpen Access
Formal analysis of device authentication applications in ubiquitous computing
Author(s) -
William R. Claycomb,
Dongwan Shin
Publication year - 2011
Publication title -
osti oai (u.s. department of energy office of scientific and technical information)
Language(s) - English
Resource type - Conference proceedings
DOI - 10.1145/1982185.1982282
Subject(s) - computer science , authentication (law) , computer security , authentication protocol , ubiquitous computing , channel (broadcasting) , mobile device , message authentication code , computer network , cryptography , world wide web , human–computer interaction
Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom