Analysis and modification of ASK mobile security protocol

Il Gon Kim, Hyun Seok Kim, Ji Yeon Lee, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification approach, we propose a modification, and then show that the new protocol is secure against replay attack.

Original languageEnglish
Title of host publicationProceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05
Pages79-83
Number of pages5
Volume2005
DOIs
Publication statusPublished - 2005 Dec 1

Fingerprint

Network protocols
Amplitude shift keying
Mobile security

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Kim, I. G., Kim, H. S., Lee, J. Y., & Choi, J. Y. (2005). Analysis and modification of ASK mobile security protocol. In Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05 (Vol. 2005, pp. 79-83). [1581579] https://doi.org/10.1109/WMCS.2005.4

Analysis and modification of ASK mobile security protocol. / Kim, Il Gon; Kim, Hyun Seok; Lee, Ji Yeon; Choi, Jin Young.

Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. Vol. 2005 2005. p. 79-83 1581579.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, IG, Kim, HS, Lee, JY & Choi, JY 2005, Analysis and modification of ASK mobile security protocol. in Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. vol. 2005, 1581579, pp. 79-83. https://doi.org/10.1109/WMCS.2005.4
Kim IG, Kim HS, Lee JY, Choi JY. Analysis and modification of ASK mobile security protocol. In Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. Vol. 2005. 2005. p. 79-83. 1581579 https://doi.org/10.1109/WMCS.2005.4
Kim, Il Gon ; Kim, Hyun Seok ; Lee, Ji Yeon ; Choi, Jin Young. / Analysis and modification of ASK mobile security protocol. Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. Vol. 2005 2005. pp. 79-83
@inproceedings{a4d7c7bb727947f6b72235c8794a3c78,
title = "Analysis and modification of ASK mobile security protocol",
abstract = "Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification approach, we propose a modification, and then show that the new protocol is secure against replay attack.",
author = "Kim, {Il Gon} and Kim, {Hyun Seok} and Lee, {Ji Yeon} and Choi, {Jin Young}",
year = "2005",
month = "12",
day = "1",
doi = "10.1109/WMCS.2005.4",
language = "English",
isbn = "0769523919",
volume = "2005",
pages = "79--83",
booktitle = "Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05",

}

TY - GEN

T1 - Analysis and modification of ASK mobile security protocol

AU - Kim, Il Gon

AU - Kim, Hyun Seok

AU - Lee, Ji Yeon

AU - Choi, Jin Young

PY - 2005/12/1

Y1 - 2005/12/1

N2 - Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification approach, we propose a modification, and then show that the new protocol is secure against replay attack.

AB - Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification approach, we propose a modification, and then show that the new protocol is secure against replay attack.

UR - http://www.scopus.com/inward/record.url?scp=33744903731&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33744903731&partnerID=8YFLogxK

U2 - 10.1109/WMCS.2005.4

DO - 10.1109/WMCS.2005.4

M3 - Conference contribution

AN - SCOPUS:33744903731

SN - 0769523919

SN - 9780769523910

VL - 2005

SP - 79

EP - 83

BT - Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05

ER -