Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol

Dusko Pavlovic, Catherine Meadows

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    8 Citations (Scopus)
    7 Downloads (Pure)

    Abstract

    As mobile devices pervade physical space, the familiar authentication patterns are becoming insufficient: besides entity authentication, many applications require, e.g., location authentication. Many interesting protocols have been proposed and implemented to provide such strengthened forms of authentication, but there are very few proofs that such protocols satisfy the required security properties. In some cases, the proofs can be provided in the symbolic model. More often, various physical factors invalidate the perfect cryptography assumption, and the symbolic model does not apply. In such cases, the protocol cannot be secure in an absolute logical sense, but only with a high probability. But while probabilistic reasoning is thus necessary, the analysis in the full computational model may not be warranted, since the protocol security does not depend on any computational assumptions, or on attacker's computational power, but only on some guessing chances. We refine the Dolev-Yao algebraic method for protocol analysis by a probabilistic model of guessing, needed to analyze protocols that mix weak cryptography with physical properties of nonstandard communication channels. Applying this model, we provide a precise security proof for a proximity authentication protocol, due to Hancke and Kuhn, that uses probabilistic reasoning to achieve its goals.
    Original languageEnglish
    Title of host publicationProceedings of the 26th Conference on the Mathematical Foundations of Programming Semantics (MFPS 2010)
    EditorsM. Mislove, P. Selinger
    Place of PublicationAmsterdam
    PublisherElsevier
    Pages97-122
    Number of pages26
    DOIs
    Publication statusPublished - Sept 2010
    Event26th Conference on the Mathematical Foundations of Programming Semantics, MFPS 2010 - Ottawa, Canada
    Duration: 6 May 201010 May 2010
    Conference number: 26

    Publication series

    NameElectronic Notes in Theoretical Computer Science
    PublisherElsevier
    Volume265
    ISSN (Print)1571-0661

    Conference

    Conference26th Conference on the Mathematical Foundations of Programming Semantics, MFPS 2010
    Abbreviated titleMFPS
    Country/TerritoryCanada
    CityOttawa
    Period6/05/1010/05/10

    Keywords

    • SCS-Cybersecurity
    • Security protocol
    • Pervasive authentication
    • Symbolic model
    • Bayesian reasoning
    • Distance bounding

    Fingerprint

    Dive into the research topics of 'Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol'. Together they form a unique fingerprint.

    Cite this