Deakin University
Browse

File(s) under permanent embargo

Detecting collusion attacks in security protocols

journal contribution
posted on 2006-01-01, 00:00 authored by Qingfeng Chen, Yi-Ping Phoebe Chen, Shichao Zhang, C Zhang
Security protocols have been widely used to safeguard secure electronic transactions. We usually assume that principals are credible and shall not maliciously disclose their individual secrets to someone else. Nevertheless, it is impractical to completely ignore the possibility that some principals may collude in private to achieve a fraudulent or illegal purpose. Therefore, it is critical to address the possibility of collusion attacks in order to correctly analyse security protocols. This paper proposes a framework by which to detect collusion attacks in security protocols. The possibility of security threats from insiders is especially taken into account. The case study demonstrates that our methods are useful and promising in discovering and preventing collusion attacks.

History

Journal

Lecture notes in computer science

Volume

3841

Pagination

297 - 306

Publisher

Springer-Verlag

Location

Heidelberg, Germany

ISSN

0302-9743

eISSN

1611-3349

Language

eng

Publication classification

C1 Refereed article in a scholarly journal

Copyright notice

2006, Springer-Verlag

Usage metrics

    Research Publications

    Categories

    No categories selected

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC