skip to main content
10.1145/1089551.1089685acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicecConference Proceedingsconference-collections
Article

The study on the application of BAN logic in formal analysis of authentication protocols

Published: 15 August 2005 Publication History

Abstract

The authentication protocol is the most fundamental and critical issue in network security and safety system and BAN logic is the most important tool to have a formalization analysis of authentication protocols. This paper first attempts to illustrate the basic methods for BAN logic analysis protocols by making a comparative study between two simplified cases, and then discusses the function of BAN logic in formalization analysis, finally exploring its limitation and methods for improvement.

References

[1]
M. Burrows, M. Abadi, R. Needham, A Logic of Authentication{J}, ACM Transaction on Computer Systems, 1990, 8.
[2]
Gavin Lowe, Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR{C}, TACAS 1996: 147--166.
[3]
R. M. Needham and M. D. Schroeder, Using Encryption for Authentication in Large Networks of Comput ers{J}, Communications of ACM, v. 21, n. 12, Dec 1978: 993--999.
[4]
D. Otway and O. Rees, Efficient and Timely Mutual Authentication, Operating Systems Review, v.21, n. 1, Dec 1987: 8--10.
[5]
Feng Deng-guo, The research status and trend of information security, The technology and application of network security {M}. 2001, 1(1):8--13.
[6]
Qing.Si-han. The security of information systems{M}. Beijing: science press, 2003: 47--67
[7]
Timo Kyntaja, A Logic of Authentication by Burrows{J}, Abadi and Needham. http://www.tcm.hut.fi/Opinnot/Tik-110.501/1995/ban.html
[8]
Bruce Schneier;Wu Shi-zhong etc translated, Applied cryptography: protocols, algorithms, and souce code in C{M}, Beijing: machine industry press.2000.1

Cited By

View all
  • (2024)Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment2024 1st International Conference on Sustainable Computing and Integrated Communication in Changing Landscape of AI (ICSCAI)10.1109/ICSCAI61790.2024.10867208(1-13)Online publication date: 4-Jul-2024
  • (2024)Mechanism for Device Authentication and Session Key Generation in Industrial Internet of Things NetworksIEEE Access10.1109/ACCESS.2024.343568812(108770-108785)Online publication date: 2024
  • (2023)Lightweight Encryption and Authentication for Controller Area Network of Autonomous VehiclesIEEE Transactions on Vehicular Technology10.1109/TVT.2023.3281276(1-15)Online publication date: 2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICEC '05: Proceedings of the 7th international conference on Electronic commerce
August 2005
957 pages
ISBN:1595931120
DOI:10.1145/1089551
  • Conference Chairs:
  • Qi Li,
  • Ting-Peng Liang
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 August 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. BAN logic
  2. authentication protocols
  3. formalization analysis

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 150 of 244 submissions, 61%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment2024 1st International Conference on Sustainable Computing and Integrated Communication in Changing Landscape of AI (ICSCAI)10.1109/ICSCAI61790.2024.10867208(1-13)Online publication date: 4-Jul-2024
  • (2024)Mechanism for Device Authentication and Session Key Generation in Industrial Internet of Things NetworksIEEE Access10.1109/ACCESS.2024.343568812(108770-108785)Online publication date: 2024
  • (2023)Lightweight Encryption and Authentication for Controller Area Network of Autonomous VehiclesIEEE Transactions on Vehicular Technology10.1109/TVT.2023.3281276(1-15)Online publication date: 2023
  • (2023)A lightweight D2D authentication protocol for relay coverage scenario in 5G mobile networkComputer Networks10.1016/j.comnet.2023.109679225(109679)Online publication date: Apr-2023
  • (2022)BLS based authentication and token-based authorization for Smart Home2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)10.1109/ICCCNT54827.2022.9984295(1-7)Online publication date: 3-Oct-2022
  • (2019)An Evaluative Review of the Formal Verification for VANET Protocols2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)10.1109/IWCMC.2019.8766783(1209-1214)Online publication date: Jun-2019
  • (2018)Cryptanalysis and Enhancement of an Anonymous Self-Certified Key Exchange ProtocolWireless Personal Communications: An International Journal10.1007/s11277-017-5156-599:2(863-891)Online publication date: 1-Mar-2018
  • (2018)An Implementation of the OAuth 2.0 for an Enterprise Service BusComputational Science and Its Applications – ICCSA 201810.1007/978-3-319-95162-1_32(469-484)Online publication date: 4-Jul-2018
  • (2017)Data security in mobile cloud computing paradigmThe Journal of Supercomputing10.1007/s11227-016-1945-y73:6(2558-2631)Online publication date: 1-Jun-2017
  • (2017)Anonymous and expeditious mobile user authentication scheme for GLOMONET environmentsInternational Journal of Communication Systems10.1002/dac.346131:2Online publication date: 7-Nov-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media