Near Field Communication (NFC) is a Radio Frequency (RF) technology that allows data to be exchanged between devices that are in close proximity. An NFC-based mobile coupon (M-coupon) is a coupon that is retrieved by the user from a source such as a newspaper or a smart poster and redeemed afterwards. The M-coupon is a cryptographically secured electronic message with some value stored on user's mobile. We develop a formal framework for security analysis of NFC mobile coupons protocols using formal methods (CasperFDR). The framework aims to check whether NFC M-coupon protocols address their security requirements. The paper starts with a formal definition of the NFC M-coupon requirements in which can be applied to a variety of protocols. Then, we apply the framework to a quadratic residue-based NFC M-coupon protocol proposed in the literature. The analysis shows an attack against User Authentication property. An additional contribution is that we model the protocol with a challenge of modelling the quadratic residue theorem (QR). We propose two ways of abstracting QR in the model with the pros and cons of both methods. We show how to overcome some limitations of CasperFDR, the protocol analysis tool used, that prevent us from modelling the protocol in a natural way. Moreover, we discuss an interesting observation regarding how found attacks can be affected by a divided long message in CasperFDR.
“…Authors of [11] propose a way to transfer PANA context. PANA is a network-layer transport for Extensible Authentication Protocol (EAP) to enable network access authentication between clients and access networks.…”
Section: Context Transfer To Optimize Securitymentioning
The use of the Internet must be able to be in confidence for users but security provisioning has a cost for ISPs 1. In a mobility context this security must be set up from scratch after each handover and for each customer. Therefore, a mechanism has been designed in the standardization bodies: the Context Transfer. This mechanism aims to transfer suitable information between equipments in order to reduce handover time. The benefit for an operator would then be a same security level during and after handover in mobile networks but with a cost as lower as possible. The purpose of this paper is to set out an application of the Context Transfer Protocol to IPsec 2 in a IPv6 mobile environment. After a state of the art of context transfer for security, the paper quickly presents CXTP 3 defined at the IETF 4. Then, it defines the IPsec context and finally, it describes a CXTP based solution to transfer this context between two access routers in a IPv6 mobility environment.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.