Il-Gon Kim, Hyunsung Kim, Ji-Yeon Lee, Jin-Young Choi
{"title":"ASK移动安全协议的分析与修改","authors":"Il-Gon Kim, Hyunsung Kim, Ji-Yeon Lee, Jin-Young Choi","doi":"10.1109/WMCS.2005.4","DOIUrl":null,"url":null,"abstract":"Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification approach, we propose a modification, and then show that the new protocol is secure against replay attack","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Analysis and Modification of ASK Mobile Security Protocol\",\"authors\":\"Il-Gon Kim, Hyunsung Kim, Ji-Yeon Lee, Jin-Young Choi\",\"doi\":\"10.1109/WMCS.2005.4\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification approach, we propose a modification, and then show that the new protocol is secure against replay attack\",\"PeriodicalId\":117531,\"journal\":{\"name\":\"Second IEEE International Workshop on Mobile Commerce and Services\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-07-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Second IEEE International Workshop on Mobile Commerce and Services\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WMCS.2005.4\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Second IEEE International Workshop on Mobile Commerce and Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WMCS.2005.4","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis and Modification of ASK Mobile Security Protocol
Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification approach, we propose a modification, and then show that the new protocol is secure against replay attack