Security Analysis of Wireless Authentication Protocols

Author(s): Ashish Joshi*, Amar Kumar Mohapatra.

Journal Name: International Journal of Sensors, Wireless Communications and Control

Volume 9 , Issue 2 , 2019

Become EABM
Become Reviewer

Graphical Abstract:


Abstract:

Background & Objective: Cryptographic protocols had been evident method for ensuring con dentiality, Integrity and authentication in various digital communication systems. However the validation and analysis of such cryptographic protocols was limited to usage of formal mathematical models until few years back.

Methods: In this paper, various popular cryptographic protocols have been studied. Some of these protocols (PAP, CHAP, and EAP) achieve security goals in peer to peer communication while others (RADIUS, DIAMETER and Kerberos) can work in multiparty environment. These protocols were validated and analysed over two popular security validation and analysis tools AVISPA and Scyther. The protocols were written according to their documentation using the HLPSL and SPDL for analysis over AVISPA and Scyther respectively. The results of these tools were analysed to nd the possible attack an each protocol. Afterwards The execution time analysis of the protocols were done by repeating the experiment for multiple iterations over the command line versions of these tools.As the literature review suggested, this research also validates that using password based protocols (PAP) is faster in terms of execution time as compared to other methods, Usage of nonces tackles the replay attack and DIAMETER is secure than RADIUS.

Results and Conclusion: The results also showed us that DIAMETER is faster than RADIUS. Though Kerberos protocol was found to safe, the results tell us that it is compromisable under particular circumstances.

Keywords: AVISPA, protocol validation, scyther, wireless authentication, PAP, CHAP, EAP.

[1]
Lamport L. Password authentication with insecure communication. Commun ACM 1981; 24(11): 770-2.
[2]
He D, Bu J, Chan S, Chen C. Handauth: Efficient handover authentication with conditional privacy for wireless networks. IEEE Trans Comput 2013; 62(3): 616-22.
[3]
Aboba B, Blunk L, Vollbrecht J, Carlson J, Levkowetz H. Extensible authentication protocol (EAP). Technical report 2004.
[4]
Rigney C, Willens S, Rubens A, Simpson W. Remote authentication dial in user service (RADIUS). Technical report 2000.
[5]
Metz C. AAA protocols: authentication, authorization, and accounting for the Internet. IEEE Internet Comput 1999; 3(6): 75-9.
[6]
Neuman BC, Kerberos TT. An authentication service for computer networks. IEEE Commun Mag 1994; 32(9): 33-8.
[7]
Cremers CJ. The scyther tool: Verification, falsification, and analysis of security protocols. In: International conference on computer aided verification Berlin, Heidelberg: Springer. 2008; pp. 414-8.
[8]
Armando A, Basin D, Boichut Y, et al. The AVISPA tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification Berlin, Heidelberg: Springer 2005 Jul 6. 281-5.
[9]
Amin R, Islam SH, Karati A, Biswas GP. Design of an enhanced authentication protocol and its verification using AVISPA. In: 2016 3rd international conference on recent advances in information technology (RAIT) Dhanbad, India: IEEE . 2016; pp. 404-9.
[10]
Mohammadali A, Haghighi MS, Tadayon MH, Mohammadi-Nodooshan A. A novel identity-based key establishment method for advanced metering infrastructure in smart grid IEEE T. Smart Grid 2018; 9(4): 2834-42.
[11]
Odelu V, Das AK, Goswami A. SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Trans Consum Electron 2016; 62(1): 30-8.
[12]
Salekul I. Security analysis of LMAP using AVISPA. Int J Secur Netw 2014; 9(1): 30-9.
[13]
Shinde AH, Umbarkar AJ. Analysis of Cryptographic Protocols AKI, ARPKI and OPT using ProVerif and AVISPA. Int J Comp Netw Inf Secur 2016; 8(3): 34.
[14]
He D, Chen C, Ma M, Chan S, Bu J. A secure and efficient password‐authenticated group key exchange protocol for mobile ad hoc networks. Int J Commun Syst 2013; 26(4): 495-504.
[15]
Armando A, Carbone R, Compagna L. Satmc: A Sat-based model checker for security protocols, business processes, and security apis. Int J Softw Tool 2016; 18(2): 187-204.
[16]
Basin D, Mödersheim S, Vigano L. OFMC: A symbolic model checker for security protocols. Int J Inf Secur 2005; 4(3): 181-208.
[17]
Das AK. A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wirel Pers Commun 2015; 82(3): 1377-404.
[18]
Cremers C, Mauw S. Operational semantics and verification of security protocols Springer Science & Business Media 2012.Oct 30.
[19]
Ferro E, Potorti F. Bluetooth and Wi-Fi wireless protocols: a survey and a comparison. IEEE Wirel Commun 2005; 12(1): 12-26.
[20]
Arash HL, Mir SD, Behrang S. Asurvey on wireless security protocols (wep, wpa and wpa2/802.11 i). In computer science and information technology, 2009 ICCSIT 2009 2nd IEEE international conference on, pages 48-52 IEEE, 2009.
[21]
Lee JY, Lin WC, Huang YH. A lightweight authentication protocol for internet of things In: 2014 international symposium on next-generation electronics (ISNE). Taipei City, Taiwan: IEEE 2014; pp. 1-2.
[22]
Dolev D, Yao A. On the security of public key protocols. IEEE Inform Theory 1983; 29(2): 198-208.


Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 9
ISSUE: 2
Year: 2019
Page: [247 - 252]
Pages: 6
DOI: 10.2174/2210327908666180806112157
Price: $25

Article Metrics

PDF: 10
HTML: 1

Special-new-year-discount