Il-Gon Kim, Hyunsung Kim, Ji-Yeon Lee, Jin-Young Choi
{"title":"Analysis and Modification of ASK Mobile Security Protocol","authors":"Il-Gon Kim, Hyunsung Kim, Ji-Yeon Lee, Jin-Young Choi","doi":"10.1109/WMCS.2005.4","DOIUrl":null,"url":null,"abstract":"Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification approach, we propose a modification, and then show that the new protocol is secure against replay attack","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Second IEEE International Workshop on Mobile Commerce and Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WMCS.2005.4","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification approach, we propose a modification, and then show that the new protocol is secure against replay attack