2012
DOI: 10.1002/sec.580
|View full text |Cite
|
Sign up to set email alerts
|

Reverse‐safe authentication protocol for secure USB memories

Abstract: USB memory devices are both portable and easily accessible, and have thus become one of the most popular forms of external storage device. However, if a USB device is lost, stolen, or hacked, it may lead to leakage of critical information. It is a logical outcome that malicious individuals will try to steal their colleagues' USB memories. Consequently, various USB products with built-in security functions have been developed. To our knowledge, there has been little or no security analysis and comparison of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(17 citation statements)
references
References 6 publications
0
17
0
Order By: Relevance
“…The first related literature is taxonomy on the usage of cryptographic authentication protocol in USB storage devices. This paper was published by K. Lee et al [5]. In this work, they explore the authentication protocols on the USB storage devices and analyze vulnerabilities on them.…”
Section: A Authentication Protocols For Usb Storage Devicesmentioning
confidence: 99%
“…The first related literature is taxonomy on the usage of cryptographic authentication protocol in USB storage devices. This paper was published by K. Lee et al [5]. In this work, they explore the authentication protocols on the USB storage devices and analyze vulnerabilities on them.…”
Section: A Authentication Protocols For Usb Storage Devicesmentioning
confidence: 99%
“…The first related literature that worth to look at was published by K. Lee et al [7]. In this work, they explore the authentication protocols on the USB storage devices and analyze vulnerabilities on them.…”
Section: Review Of Authentication Protocolsmentioning
confidence: 99%
“…The concept was originally introduced by an Israeli IT company in 2000 [1] and has been advanced significantly since then. Indeed, USB technology has been further developed because such devices offer easy connection and disconnection, free data change and deletion, fast data transfer, and high portability [2,3]. In fact, these features of the USB flash drive have made it the most widely used storage unit currently in use [3].…”
Section: Introductionmentioning
confidence: 99%
“…The secure USB flash drive was developed to solve the problem of data exposure by the security threats described above. A secure USB flash drive is a USB flash drive that comprises a security function designed to safely protect data stored inside a USB and supplements the vulnerability of a conventional USB flash drive with data encryption/decryption, user authentication and identification, prevention of arbitrary data copying, and data erasure technology to protect the data at the time of loss [3,4]. There are many studies on diverse methods of applying these technologies to protect data, which can be broadly divided into the software type and the hardware type.…”
Section: Introductionmentioning
confidence: 99%