CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

An Estimated Model of Risk Analysis of Attacks on Smart Card Authentication Schemes

Published on August 2013 by Deepak Sharma, Vinod Kumar
National Conference on Recent Trends in Engineering and Management
Foundation of Computer Science USA
NCRTEM - Number 1
August 2013
Authors: Deepak Sharma, Vinod Kumar
3ab59ce3-dbde-4adf-a1c2-3dd7a73d2fa4

Deepak Sharma, Vinod Kumar . An Estimated Model of Risk Analysis of Attacks on Smart Card Authentication Schemes. National Conference on Recent Trends in Engineering and Management. NCRTEM, 1 (August 2013), 8-11.

@article{
author = { Deepak Sharma, Vinod Kumar },
title = { An Estimated Model of Risk Analysis of Attacks on Smart Card Authentication Schemes },
journal = { National Conference on Recent Trends in Engineering and Management },
issue_date = { August 2013 },
volume = { NCRTEM },
number = { 1 },
month = { August },
year = { 2013 },
issn = 0975-8887,
pages = { 8-11 },
numpages = 4,
url = { /proceedings/ncrtem/number1/13066-1302/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Engineering and Management
%A Deepak Sharma
%A Vinod Kumar
%T An Estimated Model of Risk Analysis of Attacks on Smart Card Authentication Schemes
%J National Conference on Recent Trends in Engineering and Management
%@ 0975-8887
%V NCRTEM
%N 1
%P 8-11
%D 2013
%I International Journal of Computer Applications
Abstract

With the rapid growth of computer networks, more and more users access the remote server’s service in a distributed computing environment. Due to the fast development of the Internet and wireless communications, many activities like online-shopping, online banking, online voting are conducted over it. Authentication is one of the essential security features of network communication. The authentication process ascertains the legitimacy of the communicating partners in communication. In the authentication procedure, the promoter of the communication and the defendant derives some identification codes of each other prior to start of the message transaction. Sundry methods have been introduced regarding the authentication process from time to time. The static approach authentication schemes are vulnerable to different types of attacks. The growth of smart card systems faces security threats to both the card and its environment. Issues related to readers, protocol implementations, the smart card’s hardware security features or a combination of logical and physical attacks is of legitimate concern. All the elements of a smart card system have their own specific behavior. They could be attacked in various ways. In this paper we analyze the smart card attacks through a noncyclic attack graph. Noncyclic attack graphs provide an intuitive aid in threat analysis. We dissert that such a formal interpretation is indispensable to precisely understand how noncyclic attack graphs can be framed up during design and analysis. We provide an educational semantics, based on a mapping to attack stack, which abstracts from the internal structure of a Noncyclic attack graph, we study transformations between Noncyclic attack graphs, and we study the attribution and the projection of a Noncyclic attack graph.

References
  1. Bruce Schneier: 'Secrets and Lies' attack trees:
  2. Terrance R. Ingoldsby: Understanding Risk Through Attack Tree Analysis, CSI Computer Security Journal, Spring 2004, Volume XX, Number 2. pp 33-59
  3. Bruce Schneier, Adam Schostack: Breaking Up Is Hard To Do: Modelling Security Threats for Smart Cards, Usenix Workshop on Smartcard Technology, February
  4. David Corcoran: Security-related Exposures and Solutions in Smartcards,Information Security Bulletin, November 2000. pp. 13-22.
  5. Zoltán Kincses: On avoidance of attacks against the pin error counter of smart cards, (CS) – The Fourth Conference of PhD Students in Computer Science 2 Szeged, Hungary, July 2004. Abstract on pp. 68:
  6. Michael Lamla: Hardware attacks on smart cards – overview, Eurosmart SecurityConference, 2000. Marseille, pp. 31-39.
  7. Ross Anderson: Security Engineering – A Guide to Building Dependable Distributed Systems, 2001. John Wiley & Sons Inc.
  8. Wolfgang Rankl, Wolfgang Effing: Overview about Attacks on Smart Cards, 2003,Munich, from their own 'Smart Card Handbook' (John Wiley & Sons, ISBN: 0-470-85668-8).
  9. P. Kocher and B. Jun, Differential power analysis," Proceedings of Crypto '99, pp. 388-397, Springer-Verlag, 1999.
  10. T. S. Messerges, E. A. Dabbish, and R. H. Sloan,Examining smart-card security under the threat of power analysis attacks," IEEE Transactions on Computers, vol. 51, no. 5, pp. 541-552, 2002.
  11. Leach J. Dynamic authentication for smart cards,Computers & Security, Vol 14 No 5 1995, Volume: 14 Issue: 5 pp. 385-389 (5 pages)
  12. P. Urien, "Internet card, a smart card as a true Internet node", Computer Communications, 2000, pp. 1655-1666.
  13. Verschuren T. , Smart Access: Strong Authentication on the Web, Computer Networks and ISDN system 1998,pp 1511-1519
Index Terms

Computer Science
Information Sciences

Keywords

No Cyclic Attack Graph Authentication Integrity