Skip to main content

Security Proof of KerNeeS Protocol Based on Logic of Events

  • Conference paper
  • First Online:
Theoretical Computer Science (NCTCS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 882))

Included in the following conference series:

  • 325 Accesses

Abstract

The Near Filed Communication (NFC) is widely used on mobile devices and make it possible to take advantage of NFC system to complete mobile payment. But with the development of NFC, its problem are increasingly exposed, especially the security and privacy of authentication. Logic of events is a formal method to describe the protocol state transition and algorithm in concurrent and distributed systems, which can be used to prove the security of network protocols. Based on logic of events, we propose migration rule and derive inheritability to reduce redundancy and complexity of protocol analysis procedure, and improve efficiency of protocol analysis. We study the KerNeeS protocol which providing mutual authentication between POS and NFC phone, and conclude that the protocol can guarantee authentication between entities involved in the payment for secure payment transactions. The logic of events can be applied to the formal analysis of similar mobile payment protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Odelu, V., Das, A.K., Goswami, A.: SEAP: secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Trans. Consum. Electron. 62(1), 3–38 (2016)

    Article  Google Scholar 

  2. Badra, M., Badra, R.B.: A lightweight security protocol for NFC-based mobile phone. Proc. Comput. Sci. 83, 705–711 (2016)

    Article  Google Scholar 

  3. Dong, M., Ota, K., Yang, L.T., Liu, A., Guo, M.: LSCD: a low storage clone protocol for cyber-physical systems. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 35(5), 712–723 (2016)

    Article  Google Scholar 

  4. Zhang, L., Wei, L., Huang, D., Zhang, K., Dong, M., Ota, K.: MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing. Secur. Commun. Netw. 9(16), 3777–3789 (2016)

    Article  Google Scholar 

  5. Zhang, Y., Wang, Z., Li, Q., Lou, J., Yao, D.: Research progress and trends on the security of near field communication. Chin. J. Comput. 39(06), 1190–1207 (2016)

    MathSciNet  Google Scholar 

  6. Datta, A., Derek, A., Mitchell, J.C., et al.: Protocol composition logic (PCL). Electron. Notes Theor. Comput. Sci. 172, 311–358 (2007)

    Article  MathSciNet  Google Scholar 

  7. Gao, S., Hu, A.Q., Shi, L., Chen, X.B.: A survey on formal analysis of security protocols. J. Cryptol. Res. 1(5), 504–512 (2014)

    Google Scholar 

  8. Wang, Z., Xu, D., Wang, X., Tang, Z., Wei, L.: Reliability analysis and improvement of BAN logic. Comput. Eng. 38(17), 110–115 (2012)

    Google Scholar 

  9. Xiao, M., Bickford, M.: Logic of events for proving security properties of protocols. In: Proceedings of IEEE International Conference on Web Information System and Mining (WISM 2009), pp. 519–523 (2009)

    Google Scholar 

  10. Bickford, M.: Unguessable atoms: a logic foundation for security. In: Proceedings of VSTTE 2008, pp. 30–53 (2008)

    Google Scholar 

  11. Bickford, M., Constable, R.L.: Automated proof of authentication protocols in logic of events. In: Proceedings of 6th International Verification Workshop, pp. 13–30 (2010)

    Google Scholar 

  12. Ceipher, U.B., Medaglia, C.M., Marino, A., Sposto, S., Moronli, A.: KerNeeS: a protocol for mutual authentication between NFC phones and POS terminals for secure payment transactions. In: 2012 9th International ISC Conference on Information Security and Cryptology (ISCISC). IEEE, pp. 115–120 (2012)

    Google Scholar 

  13. Xiao, M., Ma, C., Deng, C.: A novel approach to automatic security protocol analysis based on authentication event logic. Chin. J. Electron. 24(1), 187–192 (2015)

    Article  Google Scholar 

  14. Li, Y., Xiao, M., Li, W.: Security proof of wireless mesh network authentication protocol based on logic of events. Comput. Eng. Sci. 39(12), 2236–2244 (2017)

    Google Scholar 

  15. Xiao, M., Deng, C., Ma, C., et al.: Proving authentication property of modified Needham-Schroder protocol with logic of events. In: Proceedings of International Conference on Computer Information System and Industrial Applications, pp. 379–383 (2015)

    Google Scholar 

  16. Liu, X., Xiao, M., Cheng, D., et al.: Security authentication property of the modified Needham-Schroder protocol based on logic of event. Comput. Eng. Sci. 37(10), 1850–1855 (2015)

    Google Scholar 

  17. Xiao, M., Liu, X., Li, Y., et al.: Security certification of three-party network protocols based on strong authentication theory. J. Front. Comput. Sci. Technol. 10(12), 1701–1710 (2016)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China under Grant 61163005 and 61562026, the Jiangxi Province Key Subject Academic and Technical Leader Funding Project (2017XSDTR0105), the National Natural Science Foundation of Jiangxi Province of China (20161BAB202063).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ke Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, K., Xiao, M., Chen, J. (2018). Security Proof of KerNeeS Protocol Based on Logic of Events. In: Li, L., Lu, P., He, K. (eds) Theoretical Computer Science. NCTCS 2018. Communications in Computer and Information Science, vol 882. Springer, Singapore. https://doi.org/10.1007/978-981-13-2712-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2712-4_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2711-7

  • Online ISBN: 978-981-13-2712-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics