Design guidelines for security protocols to prevent replay & parallel session attacks

被引:10
|
作者
Jurcut, Anca D. [1 ]
Coffey, Toni [1 ]
Dojen, Reiner [1 ]
机构
[1] Univ Limerick, Dept Elect & Comp Engn, Limerick, Ireland
基金
爱尔兰科学基金会;
关键词
Security protocols; Design guidelines; Attack detection; Replay attacks; Parallel session attacks; Freshness of messages; Symmetry of messages; Signed messages; Challenge-response handshake; USER AUTHENTICATION SCHEME; SYSTEMATIC DESIGN; KEY-DISTRIBUTION; EFFICIENT; CRYPTANALYSIS; IMPROVEMENTS; PRIVACY; FLAW;
D O I
10.1016/j.cose.2014.05.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work is concerned with the design of security protocols. These protocols are susceptible to intruder attacks and their security compromised if weaknesses in the protocols' design are evident. In this paper a new analysis is presented on the reasons why security protocols are vulnerable to replay and parallel session attack and based on this analysis a new set of design guidelines to ensure resistance to these attacks is proposed. The guidelines are general purpose so as to encompass a wide spectrum of security protocols. Further, an empirical study on the effectiveness of the proposed guidelines is carried out on a set of protocols, incorporating those that are known to be vulnerable to replay or parallel session attacks as well as some amended versions that are known to be free of these weaknesses. The goal of this study is to establish conformance of the set of protocols with the proposed design guidelines. The results of the study show that any protocol following the design guidelines can be considered free of weaknesses exploitable by replay or parallel session attacks. On the other hand, if non-conformance of a protocol with the design guidelines is determined, then the protocol is vulnerable to replay or parallel session attacks. (C) 2014 Elsevier Ltd. All rights reserved.
引用
下载
收藏
页码:255 / 273
页数:19
相关论文
共 50 条
  • [1] Design Requirements to Counter Parallel Session Attacks in Security Protocols
    Jurcut, Anca D.
    Coffey, Tom
    Dojen, Reiner
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 298 - 305
  • [2] Design of Authentication Protocols Preventing Replay Attacks
    Li, Junhong
    2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 362 - 365
  • [3] A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols
    Lopez Pimentel, Juan Carlos
    Monroy, Raul
    Hutter, Dieter
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 174 (04) : 117 - 130
  • [4] A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols
    Computer Science Department, Tecnológico de Monterrey, Carretera al lago Guadalupe, Km 3.5, Atizapán, 52926, Mexico
    不详
    Electron. Notes Theor. Comput. Sci., 2007, 4 (117-130):
  • [5] How to prevent type flaw attacks on security protocols
    Heather, J
    Lowe, G
    Schneider, S
    13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 255 - 268
  • [6] Algebraic Replay Attacks on Authentication in RFID Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Benmohammed, Mohamed
    ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
  • [7] A formal analysis for capturing replay attacks in cryptographic protocols
    Gao, Han
    Bodei, Chiara
    Degano, Pierpaolo
    Nielson, Hanne Riis
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
  • [8] Formally analysing a security protocol for replay attacks
    Long, Benjamin W.
    Fidge, Colin J.
    2006 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 171 - +
  • [9] Uncovering attacks on security protocols
    Yang, W
    Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 572 - 575
  • [10] Multichannel Protocols to Prevent Relay Attacks
    Stajano, Frank
    Wong, Ford-Long
    Christianson, Bruce
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 4 - +