Title
Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol.
Abstract
Trusted computing architecture ensures the behavior of software that runs on a user machine by protecting software-level attacks. Due to the potential of exposing a user's private information while accessing a system, many studies have focused on analyzing existing protocols to develop new methods based on biometrics or additional devices to add new layers of security to the authentication process. For a few years, the idea of utilizing the combination of something you know with something you have and a personal authentication device (PAD) has become common in verification protocols. Very recently, a more secure PAD, namely the Offline Personal Authentication Device (OffPAD), was invented to improve the authentication process. This single device can be used to manage the identities of both users and service providers as well as support the authentication process, while being offline most of the time. In this paper, a rigorous vulnerability analysis for OffPAD-based authentication techniques is conducted using an attack tree analysis. Finally, to overcome the vulnerabilities, mitigation techniques are proposed.
Year
DOI
Venue
2018
10.1109/ACCESS.2017.2789301
IEEE ACCESS
Keywords
Field
DocType
Data origin authentication,entity authentication,biometric authentication,offline personal authentication device (OffPAD),vulnerability analysis
Authentication,Trusted Computing,Computer science,Vulnerability assessment,Server,Attack tree,Computer network,Service provider,Authentication protocol,Biometrics
Journal
Volume
ISSN
Citations 
6
2169-3536
1
PageRank 
References 
Authors
0.35
0
7
Name
Order
Citations
PageRank
Mada Alhaidary110.35
Mizanur Rahman212920.97
Mohammed Zakariah371.78
M. Shamim Hossain4117183.62
atif alamri5110869.29
Md Sarwar M. Haque610.35
Gupta, B.B.7605.13