Detecting collusion attacks in security protocols


Autoria(s): Chen, Qingfeng; Chen, Yi-Ping Phoebe; Zhang, Shichao; Zhang, Chengqi
Data(s)

01/01/2006

Resumo

Security protocols have been widely used to safeguard secure electronic transactions. We usually assume that principals are credible and shall not maliciously disclose their individual secrets to someone else. Nevertheless, it is impractical to completely ignore the possibility that some principals may collude in private to achieve a fraudulent or illegal purpose. Therefore, it is critical to address the possibility of collusion attacks in order to correctly analyse security protocols. This paper proposes a framework by which to detect collusion attacks in security protocols. The possibility of security threats from insiders is especially taken into account. The case study demonstrates that our methods are useful and promising in discovering and preventing collusion attacks. <br />

Identificador

http://hdl.handle.net/10536/DRO/DU:30003615

Idioma(s)

eng

Publicador

Springer-Verlag

Relação

http://dro.deakin.edu.au/eserv/DU:30003615/n20060401.pdf

http://dx.doi.org/10.1007/11610113_27

Direitos

2006, Springer-Verlag

Tipo

Journal Article