Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol

Mada Alhaidary, Sk Md Mizanur Rahman, Mohammed Zakariah, M. Shamim Hossain*, Atif Alamri, Md Sarwar M. Haque, B. B. Gupta

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

14 Scopus citations

Abstract

Trusted computing architecture ensures the behavior of software that runs on a user machine by protecting software-level attacks. Due to the potential of exposing a user's private information while accessing a system, many studies have focused on analyzing existing protocols to develop new methods based on biometrics or additional devices to add new layers of security to the authentication process. For a few years, the idea of utilizing the combination of something you know with something you have and a personal authentication device (PAD) has become common in verification protocols. Very recently, a more secure PAD, namely the Offline Personal Authentication Device (OffPAD), was invented to improve the authentication process. This single device can be used to manage the identities of both users and service providers as well as support the authentication process, while being offline most of the time. In this paper, a rigorous vulnerability analysis for OffPAD-based authentication techniques is conducted using an attack tree analysis. Finally, to overcome the vulnerabilities, mitigation techniques are proposed.

Original languageEnglish
Pages (from-to)6071-6081
Number of pages11
JournalIEEE Access
Volume6
DOIs
StatePublished - 2 Jan 2018

Bibliographical note

Publisher Copyright:
© 2013 IEEE.

Keywords

  • Data origin authentication
  • biometric authentication
  • entity authentication
  • offline personal authentication device (OffPAD)
  • vulnerability analysis

ASJC Scopus subject areas

  • General Computer Science
  • General Materials Science
  • General Engineering

Fingerprint

Dive into the research topics of 'Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol'. Together they form a unique fingerprint.

Cite this