Analysis and modification of ASK mobile security protocol

Il Gon Kim, Hyun Seok Kim, Ji Yeon Lee, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification approach, we propose a modification, and then show that the new protocol is secure against replay attack.

Original languageEnglish
Title of host publicationProceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05
Pages79-83
Number of pages5
DOIs
Publication statusPublished - 2005

Publication series

NameProceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05
Volume2005

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Analysis and modification of ASK mobile security protocol'. Together they form a unique fingerprint.

Cite this