Abstract
The Near Filed Communication (NFC) is widely used on mobile devices and make it possible to take advantage of NFC system to complete mobile payment. But with the development of NFC, its problem are increasingly exposed, especially the security and privacy of authentication. Logic of events is a formal method to describe the protocol state transition and algorithm in concurrent and distributed systems, which can be used to prove the security of network protocols. Based on logic of events, we propose migration rule and derive inheritability to reduce redundancy and complexity of protocol analysis procedure, and improve efficiency of protocol analysis. We study the KerNeeS protocol which providing mutual authentication between POS and NFC phone, and conclude that the protocol can guarantee authentication between entities involved in the payment for secure payment transactions. The logic of events can be applied to the formal analysis of similar mobile payment protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Odelu, V., Das, A.K., Goswami, A.: SEAP: secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Trans. Consum. Electron. 62(1), 3–38 (2016)
Badra, M., Badra, R.B.: A lightweight security protocol for NFC-based mobile phone. Proc. Comput. Sci. 83, 705–711 (2016)
Dong, M., Ota, K., Yang, L.T., Liu, A., Guo, M.: LSCD: a low storage clone protocol for cyber-physical systems. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 35(5), 712–723 (2016)
Zhang, L., Wei, L., Huang, D., Zhang, K., Dong, M., Ota, K.: MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing. Secur. Commun. Netw. 9(16), 3777–3789 (2016)
Zhang, Y., Wang, Z., Li, Q., Lou, J., Yao, D.: Research progress and trends on the security of near field communication. Chin. J. Comput. 39(06), 1190–1207 (2016)
Datta, A., Derek, A., Mitchell, J.C., et al.: Protocol composition logic (PCL). Electron. Notes Theor. Comput. Sci. 172, 311–358 (2007)
Gao, S., Hu, A.Q., Shi, L., Chen, X.B.: A survey on formal analysis of security protocols. J. Cryptol. Res. 1(5), 504–512 (2014)
Wang, Z., Xu, D., Wang, X., Tang, Z., Wei, L.: Reliability analysis and improvement of BAN logic. Comput. Eng. 38(17), 110–115 (2012)
Xiao, M., Bickford, M.: Logic of events for proving security properties of protocols. In: Proceedings of IEEE International Conference on Web Information System and Mining (WISM 2009), pp. 519–523 (2009)
Bickford, M.: Unguessable atoms: a logic foundation for security. In: Proceedings of VSTTE 2008, pp. 30–53 (2008)
Bickford, M., Constable, R.L.: Automated proof of authentication protocols in logic of events. In: Proceedings of 6th International Verification Workshop, pp. 13–30 (2010)
Ceipher, U.B., Medaglia, C.M., Marino, A., Sposto, S., Moronli, A.: KerNeeS: a protocol for mutual authentication between NFC phones and POS terminals for secure payment transactions. In: 2012 9th International ISC Conference on Information Security and Cryptology (ISCISC). IEEE, pp. 115–120 (2012)
Xiao, M., Ma, C., Deng, C.: A novel approach to automatic security protocol analysis based on authentication event logic. Chin. J. Electron. 24(1), 187–192 (2015)
Li, Y., Xiao, M., Li, W.: Security proof of wireless mesh network authentication protocol based on logic of events. Comput. Eng. Sci. 39(12), 2236–2244 (2017)
Xiao, M., Deng, C., Ma, C., et al.: Proving authentication property of modified Needham-Schroder protocol with logic of events. In: Proceedings of International Conference on Computer Information System and Industrial Applications, pp. 379–383 (2015)
Liu, X., Xiao, M., Cheng, D., et al.: Security authentication property of the modified Needham-Schroder protocol based on logic of event. Comput. Eng. Sci. 37(10), 1850–1855 (2015)
Xiao, M., Liu, X., Li, Y., et al.: Security certification of three-party network protocols based on strong authentication theory. J. Front. Comput. Sci. Technol. 10(12), 1701–1710 (2016)
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China under Grant 61163005 and 61562026, the Jiangxi Province Key Subject Academic and Technical Leader Funding Project (2017XSDTR0105), the National Natural Science Foundation of Jiangxi Province of China (20161BAB202063).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yang, K., Xiao, M., Chen, J. (2018). Security Proof of KerNeeS Protocol Based on Logic of Events. In: Li, L., Lu, P., He, K. (eds) Theoretical Computer Science. NCTCS 2018. Communications in Computer and Information Science, vol 882. Springer, Singapore. https://doi.org/10.1007/978-981-13-2712-4_5
Download citation
DOI: https://doi.org/10.1007/978-981-13-2712-4_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2711-7
Online ISBN: 978-981-13-2712-4
eBook Packages: Computer ScienceComputer Science (R0)