Security Analysis of MAC Protocol for Mobile Device Identification Based on PARADIS

Author(s):  
Niansheng Liu ◽  
Huaiyu Dai ◽  
Donghui Guo
Author(s):  
Nian-hua KANG ◽  
Ming-zhi CHEN ◽  
Ying-yan FENG ◽  
Wei-ning LIN ◽  
Chuan-bao LIU ◽  
...  

2022 ◽  
Vol 54 (9) ◽  
pp. 1-35
Author(s):  
René Mayrhofer ◽  
Stephan Sigg

Mobile device authentication has been a highly active research topic for over 10 years, with a vast range of methods proposed and analyzed. In related areas, such as secure channel protocols, remote authentication, or desktop user authentication, strong, systematic, and increasingly formal threat models have been established and are used to qualitatively compare different methods. However, the analysis of mobile device authentication is often based on weak adversary models, suggesting overly optimistic results on their respective security. In this article, we introduce a new classification of adversaries to better analyze and compare mobile device authentication methods. We apply this classification to a systematic literature survey. The survey shows that security is still an afterthought and that most proposed protocols lack a comprehensive security analysis. The proposed classification of adversaries provides a strong and practical adversary model that offers a comparable and transparent classification of security properties in mobile device authentication.


2019 ◽  
Vol 6 (2) ◽  
pp. 2922-2932 ◽  
Author(s):  
Kecheng Liu ◽  
Wenlong Shen ◽  
Yu Cheng ◽  
Lin X. Cai ◽  
Qing Li ◽  
...  

2014 ◽  
Vol 36 ◽  
pp. 320-331 ◽  
Author(s):  
Mehdi Jahanirad ◽  
Ainuddin Wahid Abdul Wahab ◽  
Nor Badrul Anuar ◽  
Mohd Yamani Idna Idris ◽  
Mohd Nizam Ayub

2012 ◽  
Author(s):  
Judith E. Gold ◽  
Feroze B. Mohamed ◽  
Sayed Ali ◽  
Mary F. Barbe
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document