On the logical verification of a group key agreement protocol for resource constrained mobile devices

Yue Li, Thomas Newe

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Due to the rapid growth of mobile networks, many advanced applications have been deployed. However, security of data will be an important factor for their full adoption. Most of these applications will be utilized on resource constrained devices, which makes security protocols currently used in wired networks not fully applicable to mobile networks. Recently, a number of key agreement protocols have been proposed for use with wireless networks involving resource-limited devices. These include the DDH-based group key agreement protocol [1], the protocol proposed by Bresson et al. [2] and Tseng's protocol [3]. In order to provide assurance that these protocols are verifiably secure and trustworthy it is necessary to perform a formal verification on their design specifications. In this paper Tseng's protocol is discussed and a formal verification is performed using the Coffey-Saidha-Newe (CSN) modal logic[4]. As a result of this verification some potential problems with the protocol are presented.

Original languageEnglish
Title of host publication2007 Australasian Telecommunication Networks and Applications Conference, ATNAC 2007
PublisherIEEE Computer Society
Pages277-281
Number of pages5
ISBN (Print)1424415578, 9781424415571
DOIs
Publication statusPublished - 2007
Event2007 Australasian Telecommunication Networks and Applications Conference, ATNAC 2007 - Christchurch, New Zealand
Duration: 2 Dec 20075 Dec 2007

Publication series

Name2007 Australasian Telecommunication Networks and Applications Conference, ATNAC 2007

Conference

Conference2007 Australasian Telecommunication Networks and Applications Conference, ATNAC 2007
Country/TerritoryNew Zealand
CityChristchurch
Period2/12/075/12/07

Keywords

  • Formal method
  • Group key agreement
  • Modal logic
  • Network securtiy
  • Wireless communication

Fingerprint

Dive into the research topics of 'On the logical verification of a group key agreement protocol for resource constrained mobile devices'. Together they form a unique fingerprint.

Cite this