首页> 外文期刊>Journal of computer security >A formal framework for security analysis of NFC mobile coupon protocols
【24h】

A formal framework for security analysis of NFC mobile coupon protocols

机译:NFC移动优惠券协议安全性分析的正式框架

获取原文
获取原文并翻译 | 示例
           

摘要

Near Field Communication (NFC) is a Radio Frequency (RF) technology that allows data to be exchanged between devices that are in close proximity. An NFC-based mobile coupon (M-coupon) is a coupon that is retrieved by the user from a source such as a newspaper or a smart poster and redeemed afterwards. The M-coupon is a cryptographically secured electronic message with some value stored on user's mobile. We develop a formal framework for security analysis of NFC mobile coupons protocols using formal methods (CasperFDR). The framework aims to check whether NFC M-coupon protocols address their security requirements. The paper starts with a formal definition of the NFC M-coupon requirements in which can be applied to a variety of protocols. Then, we apply the framework to a quadratic residue-based NFC M-coupon protocol proposed in the literature. The analysis shows an attack against User Authentication property. An additional contribution is that we model the protocol with a challenge of modelling the quadratic residue theorem (QR). We propose two ways of abstracting QR in the model with the pros and cons of both methods. We show how to overcome some limitations of CasperFDR, the protocol analysis tool used, that prevent us from modelling the protocol in a natural way. Moreover, we discuss an interesting observation regarding how found attacks can be affected by a divided long message in CasperFDR.
机译:近场通信(NFC)是一种射频(RF)技术,它允许在附近的设备之间交换数据。基于NFC的移动优惠券(M-coupon)是一种优惠券,由用户从诸如报纸或智能海报之类的来源中检索并随后兑换。 M优惠券是一种加密安全的电子消息,具有一些存储在用户手机上的价值。我们使用形式化方法(CasperFDR)开发了用于NFC移动优惠券协议安全性分析的形式化框架。该框架旨在检查NFC M优惠券协议是否满足其安全要求。本文从对NFC M优惠券要求的正式定义开始,可以将其应用于各种协议。然后,我们将该框架应用于文献中提出的基于二次残基的NFC M优惠券协议。分析显示针对用户身份验证属性的攻击。另一个贡献是,我们在对协议进行建模时遇到了对二次余数定理(QR)建模的挑战。我们提出了两种在模型中提取QR的方法,两种方法都有其优缺点。我们展示了如何克服所使用的协议分析工具CasperFDR的某些限制,这些限制使我们无法自然地对协议进行建模。此外,我们讨论了有关CasperFDR中分割的长消息如何影响找到的攻击的有趣观察。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号