Authentication of RSA via BAN logic

Authors

  • Salah A. K. Albermany University of Kufa
  • Israa N.A . Alsalhi University of Kufa

DOI:

https://doi.org/10.31642/JoKMC/2018/060101

Keywords:

Cognitive radio network, BAN logic, securit , RSA

Abstract

Web exchanges are conducted through an open network that lacks central management; it is, therefore, impossible to identify a communication partner, especially in a distributed system. Authentication is the basis of security in such systems. Providing secure communication becomes problematic in CRN because cognitive node can join and leave network dynamically that leading to be many threats targeting this kind of network. In this paper, we are using analysis authentication protocol of RSA algorithm by BAN logic also It using C# programing . By analyzing via BAN logic, we will see if this protocol is confidential, and can it be used in cognitive radio networks

Downloads

Download data is not yet available.

References

J. Mitola and G. Q. Maguire, “Cognitive radio: making software radios more personal,” IEEE Pers. Commun., vol. 6, no. 4, pp. 13–18, 1999. DOI: https://doi.org/10.1109/98.788210

J. Mitola, “Cognitive radio---an integrated agent architecture for software defined radio,” 2000.

S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE J. Sel. areas Commun., vol. 23, no. 2, pp. 201–220, 2005. DOI: https://doi.org/10.1109/JSAC.2004.839380

A. M. Wyglinski, M. Nekovee, and T. Hou, Cognitive radio communications and networks: principles and practice. Academic Press, 2009.

E. Hossain, D. Niyato, and Z. Han, Dynamic spectrum access and management in cognitive radio networks. Cambridge university press, 2009. DOI: https://doi.org/10.1017/CBO9780511609909

S. X. Ting, Z. Z. Hui, and L. Y. Gang, “Spectrum consideration for wireless communications in the twenty first century,” in Environmental Electromagnetics, 2000. CEEM 2000. Proceedings. Asia-Pacific Conference on, 2000, pp. 29–32.

J. T. J. Penttinen, The telecommunications handbook: Engineering guidelines for fixed, mobile and satellite systems. John Wiley & Sons, 2015. DOI: https://doi.org/10.1002/9781118678916

H. F. Rashvand, Using cross-layer techniques for communication systems. IGI Global, 2012. DOI: https://doi.org/10.4018/978-1-4666-0960-0

F. Li, Z. Li, G. Li, F. Dong, and W. Zhang, “Efficient Wideband Spectrum Sensing with Maximal Spectral Efficiency for LEO Mobile Satellite Systems,” Sensors, vol. 17, no. 1, p. 193, 2017. DOI: https://doi.org/10.3390/s17010193

M. Burrows, M. Abadi, and R. M. Needham, “A logic of authentication,” in Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 1989, vol. 426, no. 1871, pp. 233–271. DOI: https://doi.org/10.1098/rspa.1989.0125

M. Abadi and M. R. Tuttle, “A semantics for a logic of authentication,” in Proceedings of the tenth annual ACM symposium on Principles of distributed computing, 1991, pp. 201–216. DOI: https://doi.org/10.1145/112600.112618

K. Brauer, “Authentication and security aspects in an international multi-user network,” 2011.

R. Feng, L. Hu, and J. H. Kwak, “Authentication codes and bipartite graphs,” Eur. J. Comb., vol. 29, no. 6, pp. 1473–1482, 2008. DOI: https://doi.org/10.1016/j.ejc.2007.06.013

K. H. M. Wong, Y. Zheng, J. Cao, and S. Wang, “A dynamic user authentication scheme for wireless sensor networks,” in Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006. IEEE International Conference on, 2006, vol. 1, p. 8–pp.

H.-R. Tseng, R.-H. Jan, and W. Yang, “An improved dynamic user authentication scheme for wireless sensor networks,” in Global Telecommunications Conference, 2007. GLOBECOM’07. IEEE, 2007, pp. 986–990. DOI: https://doi.org/10.1109/GLOCOM.2007.190

D. Monniaux, “Analysis of cryptographic protocols using logics of belief: an overview,” J. Telecommun. Inf. Technol., pp. 57–67, 2002.

J. Glasgow, G. MacEwen, and P. Panangaden, “A logic for reasoning about security,” ACM Trans. Comput. Syst., vol. 10, no. 3, pp. 226–264, 1992. DOI: https://doi.org/10.1145/146937.146940

G. Coulouris, J. Dollimore, and T. Kindberg, “Archive Material from Edition 2 of Distributed Systems: Concepts and Design,” 1994.

W. Alhakami, A. Mansour, G. A. Safdar, and S. Albermany, “A secure MAC protocol for cognitive radio networks (SMCRN),” in Science and Information Conference (SAI), 2013, 2013, pp. 796–803.

S. Bakhtiari Chehelcheshmeh and M. Hosseinzadeh, “Quantum‐resistance authentication in centralized cognitive radio networks,” Secur. Commun. Networks, vol. 9, no. 10, pp. 1158–1172, 2016. DOI: https://doi.org/10.1002/sec.1408

A. D. Rubin and P. Honeyman, “Formal methods for the analysis of authentication protocols,” Center for Information Technology Integration, 1993.

P. Syverson, “The use of logic in the analysis of cryptographic protocols,” in Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on, 1991, pp. 156–170.

S. Older and S.-K. Chin, “Formal methods for assuring security of protocols,” Comput. J., vol. 45, no. 1, pp. 46–54, 2002 DOI: https://doi.org/10.1093/comjnl/45.1.46

Downloads

Published

2019-05-21

How to Cite

Albermany, S. A. K., & . Alsalhi, I. N. (2019). Authentication of RSA via BAN logic. Journal of Kufa for Mathematics and Computer, 6(1). https://doi.org/10.31642/JoKMC/2018/060101

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.