Analysis of mobile authentication protocols by SVO logic

  • Authors:
  • Abdullah Almuhaideb;Bala Srinivasan;Phu Dung Le;Campbell Wilson;Vishv Malhotra

  • Affiliations:
  • King Faisal University, Alahsa, Saudi Arabia and Monash University, Melbourne, Australia;Monash University, Melbourne, Australia;Monash University, Melbourne, Australia;Monash University, Melbourne, Australia;University of Tasmania, Tasmania, Australia

  • Venue:
  • Proceedings of the First International Conference on Security of Internet of Things
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

The next generation of mobile services makes it desirable for mobile users to be connected everywhere. Since these users usually in the move, roaming services are deployed to allow mobile users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed based on either two-party or three-party roaming structure to allow ubiquities mobile access authentication, however, limitations such as performance issues and security vulnerabilities still exist in these approaches. In this paper, we implemented a methodology for verifying authentication protocols based on SVO logic, which shows that our Passport/Visa protocols meet the desired authentication objectives and prove the protocols correctness. Moreover, we show that our proposal addresses existing limitations when compared to the other approaches.