Detecting collusion attacks in security protocols

被引:0
|
作者
Chen, QF [1 ]
Chen, YPP
Zhang, SC
Zhang, CQ
机构
[1] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3128, Australia
[2] Univ Technol Sydney, Fac Informat Technol, Sydney, NSW 2007, Australia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security protocols have been widely used to safeguard secure electronic transactions. We usually assume that principals are credible and shall not maliciously disclose their individual secrets to someone else. Nevertheless, it is impractical to completely ignore the possibility that some principals may collude in private to achieve a fraudulent or illegal purpose. Therefore, it is critical to address the possibility of collusion attacks in order to correctly analyse security protocols. This paper proposes a framework by which to detect collusion attacks in security protocols. The possibility of security threats from insiders is especially taken into account. The case study demonstrates that our methods are useful and promising in discovering and preventing collusion attacks.
引用
下载
收藏
页码:297 / 306
页数:10
相关论文
共 50 条
  • [1] Detecting Failed Attacks on Human-Interactive Security Protocols
    Roscoe, A. W.
    SECURITY PROTOCOLS XXIV, 2017, 10368 : 181 - 197
  • [2] Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion)
    Roscoe, A. W.
    SECURITY PROTOCOLS XXIV, 2017, 10368 : 198 - 205
  • [3] Uncovering attacks on security protocols
    Yang, W
    Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 572 - 575
  • [4] Distance bounding protocols: Authentication logic analysis and collusion attacks
    Meadows, Catherine
    Poovendran, Radha
    Pavlovic, Dusko
    Chang, LiWu
    Syverson, Paul
    SECURE LOCALIZATION AND TIME SYNCHRONIZATION FOR WIRELESS SENSOR AND AD HOC NETWORKS, 2007, 30 : 279 - +
  • [5] Attacks on collusion-secure fingerprinting for multicast video protocols
    Baaziz, N
    Sami, Y
    DFMA '05: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS FOR MULTIMEDIA APPLICATIONS, PROCEEDINGS, 2004, : 210 - 216
  • [6] Desynchronization attacks on RFID security protocols
    Deng, M. (dmlei2003@163.com), 1600, Universitas Ahmad Dahlan (11):
  • [7] Simulation of Security Protocols based on Scenarios of Attacks
    Jakubowska, Gizela
    Dembinski, Piotr
    Penczek, Wojciech
    Szreter, Maciej
    FUNDAMENTA INFORMATICAE, 2009, 93 (1-3) : 185 - 203
  • [8] Type flaw attacks and prevention in security protocols
    Wang Juan
    Zhang Jingwei
    Zhang Huanguo
    PROCEEDINGS OF NINTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, 2008, : 340 - +
  • [9] Security of Auditing Protocols Against Subversion Attacks
    Lv, Jiaxian
    Wang, Yi
    Su, Jinshu
    Chen, Rongmao
    Wu, Wenjun
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2020, 31 (02) : 193 - 206
  • [10] Data desynchronization attacks on RFID security protocols
    Cao, Zheng
    Ma, Jianfeng
    Yang, Lin
    Deng, Miaolei
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2013, 41 (04): : 65 - 69