Formal method for securing mutual NFC authentication protocol over LTE network
Chan Yeob Yeun, Khalifa University, Abu Dhabi, The United Arab Emirates (UAE)
NFC (Near Field Communication) has a good adaptable structure that it can be easily combined with any wireless network. Since NFC can be used to communicate without using a proper wire, all the transactions can be done remotely without any physical connections. In this paper, we propose a new authentication protocol based on LTE network to secure the NFC. Our protocol enhances the security level provided by the LTE. Our approach is new in a sense that it covers LTE in contrast to old networks like GSM & 3G substantially treated in the literature. Moreover, both GSM and 3G have several drawbacks when they are combined with the NFC technology, which has potential weakness in confidentiality, integrity, and authentication. Hence our new approach will resolve the security of the new LTE system. Also, we presented security analysis of our protocol based on the formal method, ProVerif. Finally, we expect that our protocol may result in new secure applications for the smart phone markets.
Dr. Chan Yeob Yeun serves in the position of Assistant Professor at Khalifa University; a position which he has held since 2008. Assigned to the Electrical and Computer Engineering Department. Dr. Yeun's primary areas of expertise lie in the area of Wireless Security and RFID/IoT Security. He achieved his Master's degree in Information Security, and later obtained his PhD in the same subject from Royal Holloway, University of London in 1996 and in 2000, respectively. Prior to his current position, Dr. Yeun joined as the Wireless Security Team Leader of Toshiba TRL for researching and developing 4G and Ubiquitous Security. He also served as the Vice President of LG Electronics for developing the World First Mobile TV 3G handsets such as DVB-H, TDMB and MediaFLO with CAS/DRM and as an Invited Professor at both KAU and KAIST (Previously known as ICU).
Privacy Models for RFID Authentication Scheme
Chunhua Su,Japan Advanced Institute of Science and Technology (JAIST), Japan
Due to rapid growth of RFID system applications, the security and privacy problems become more and more important to guarantee the validity of RFID systems. Without introducing proper privacy protection techniques, widespread adoption of RFID could raise privacy problems for both companies and individuals. As a fundamental issue for the design and analysis of secure RFID systems, some formal RFID privacy models were proposed in recent years to give the principles for evaluating the security and privacy in RFID system. This talk will provide some introduction of the existing privacy models for RFID authentication and their formal analysis techniques. It will also show the details of how to model the adversarial behaviors and how to analyze and prove that a specific RFID scheme is good enough to preserve the privacy.
Chunhua Su is an Assistant Professor in School of Information Science, Japan Advanced Institute of Science and Technology (JAIST). His research interests are privacy-preserving data mining, RFID security and privacy and cryptanalysis. He received the B.S. degree from Beijing Electronic and Science Institute in 2003 and received his M.S. and PhD degrees from Graduate School of Information Science and Electrical Engineering, Kyushu University in 2006 and 2009 respectively. Before joining JAIST, he worked as a research scientist in Cryptography & Security Department, Institute for Infocomm Research, Singapore.