Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Secure control protocol for universal serial bus mass storage devices

The universal serial bus (USB) has some advantages like high transmission speed, plug-and-play and hot swapping, and has become the most popular interface standard for peripheral connections. However, such features also make it easier for a malicious user to extract confidential files from computer systems via USB ports. Consequently, to control the potential security risks of USB interface, many workplace and commercial corporations have directly forbidden their employees from using USB devices. To provide a flexible way of using USB without compromising security, this study proposes a novel secure control protocol for USB storage devices. The device and the server are required to complete mutual authentication and establish a session key used to encrypt the transferred files. The details of each phase of the new protocol are given. Security analysis demonstrates that the proposed protocol conquers those security pitfalls existing in the available protocols and can resist various attacks. Performance discussion indicates that the new protocol is also efficient enough for practical applications.

References

    1. 1)
      • 15. Dolev, D., Yao, A.C.: ‘On the security of public key protocols’. Proc. IEEE 22nd Annual Symp. on Foundations of Computer Science, Nashville, USA, October 1981, pp. 350357.
    2. 2)
      • 18. Chatterjee, K., De, A., Gupta, D.: ‘Mutual authentication protocol using hyperelliptic curve cryptosystem in constrained devices’, Int. J. Netw. Sec., 2013, 15, (1), pp. 915.
    3. 3)
      • 19. Lee, C.C., Liu, C.H., Hwang, M.S.: ‘Guessing attacks on strong-password authentication protocol’, Int. J. Netw. Sec., 2013, 15, (1), pp. 6467.
    4. 4)
    5. 5)
    6. 6)
    7. 7)
      • 9. Yang, F.Y., Wu, T.D., Chiu, S.H.: ‘A secure control protocol for USB mass storage devices’, IEEE Trans. Consum. Electron., 2010, 56, (4), pp. 23392343.
    8. 8)
      • 2. Fabian, M.: ‘Endpoint security: managing USB-based removable devices with the advent of portable applications’. Proc. Fourth Annual Conf. Information Security Curriculum Development, Lafayette, USA, October 2007, pp. 2832.
    9. 9)
      • 16. Zhu, J., Ma, J.: ‘A new authentication scheme with anonymity for wireless environments’, IEEE Trans. Consum. Electron., 2004, 50, (1), pp. 230234.
    10. 10)
    11. 11)
    12. 12)
      • 13. Kocher, P., Jaffe, J., Jun, B.: ‘Differential power analysis’. Proc. Advances in Cryptology – CRYPTO'99, CA, USA, December 1999, pp. 788797.
    13. 13)
      • 1. Alzarouni, M.: ‘The reality of risks from consented use of USB devices’. Proc. Fourth Australian Conf. Information Security, Perth, Western Australia, April 2006, pp. 312317.
    14. 14)
    15. 15)
    16. 16)
    17. 17)
    18. 18)
    19. 19)
      • 6. Pointcheval, D., Zimmer, S.: ‘Multi-factor authenticated key exchange’. Proc. Sixth Int. Conf. Applied Cryptography and Network Security, Beijing, China, June 2008, pp. 277295.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cdt.2014.0196
Loading

Related content

content/journals/10.1049/iet-cdt.2014.0196
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address