Detecting collusion attacks in security protocols

Publication Type:
Conference Proceeding
Citation:
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2006, 3841 LNCS pp. 297 - 306
Issue Date:
2006-07-06
Metrics:
Full metadata record
Files in This Item:
Filename Description Size
Thumbnail2006003921.pdf608.68 kB
Adobe PDF
Security protocols have been widely used to safeguard secure electronic transactions. We usually assume that principals are credible and shall not maliciously disclose their individual secrets to someone else. Nevertheless, it is impractical to completely ignore the possibility that some principals may collude in private to achieve a fraudulent or illegal purpose. Therefore, it is critical to address the possibility of collusion attacks in order to correctly analyse security protocols. This paper proposes a framework by which to detect collusion attacks in security protocols. The possibility of security threats from insiders is especially taken into account. The case study demonstrates that our methods are useful and promising in discovering and preventing collusion attacks. © Springer-Verlag Berlin Heidelberg 2006.
Please use this identifier to cite or link to this item: