2014
DOI: 10.1002/cpe.3260
|View full text |Cite
|
Sign up to set email alerts
|

A formal analysis of authentication protocols for mobile devices in next generation networks

Abstract: Summary Next Generation Networks comprise a wide variety of access technologies such as 2G/3G, WLAN as well as the Long‐Term Evolution (LTE) networks. In this environment, mobile devices are expected to store sensitive data and represent users to access the underlying networks and connect to a wide variety of sensitive servers. It is crucial, in this sense, for end users to trust their mobile devices and for all transactions using them to be secure. Therefore, a number of communication frameworks in Next Gener… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
18
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(18 citation statements)
references
References 21 publications
(28 reference statements)
0
18
0
Order By: Relevance
“…It also involves a capability-based access control mechanism (Gollmann, 2011) (Chen, 2014) to enforce authorized access to data objects. However, unlike the AKA protocol, the access control of (M. Aiash, 2014) has not been formally verified neither critically analysed. Therefore, this paper considers the security mechanisms in (M. Aiash, 2014), and supported by formal methods approach, we discover a security vulnerability in the proposed access control and introduce an enhancement.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…It also involves a capability-based access control mechanism (Gollmann, 2011) (Chen, 2014) to enforce authorized access to data objects. However, unlike the AKA protocol, the access control of (M. Aiash, 2014) has not been formally verified neither critically analysed. Therefore, this paper considers the security mechanisms in (M. Aiash, 2014), and supported by formal methods approach, we discover a security vulnerability in the proposed access control and introduce an enhancement.…”
Section: Introductionmentioning
confidence: 99%
“…However, unlike the AKA protocol, the access control of (M. Aiash, 2014) has not been formally verified neither critically analysed. Therefore, this paper considers the security mechanisms in (M. Aiash, 2014), and supported by formal methods approach, we discover a security vulnerability in the proposed access control and introduce an enhancement. The enhancement is formally verified using formal methods approach based on Casper/FDR tool.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations