Analysing stream authentication protocols in autonomous agent-based systems

Mehmet A. Orgun*, Ji Ma, Chuchang Liu, Guido Governatori

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

5 Citations (Scopus)
29 Downloads (Pure)

Abstract

In stream authentication protocols used for large-scale data dissemination in autonomuous systems, authentication is based on the timing of the publication of keys, and depends on trust of the receiver in the sender and belief on whether an intruder can have prior knowledge of a key before it is published by a protocol. Many existing logics and approaches have successfully been applied to specify other types of authentication protocols, but most of them are not appropriate for analysing stream authentication protocols. We therefore consider a fibred modal logic that combines a belief logic with a linear-time temporal logic which can be used to analyse time-varying aspects of certain problems. With this logical system one is able to build theories of trust for analysing stream authentication protocols, which can deal with not only agent beliefs but also the timing properties of an autonomous agent-based system.

Original languageEnglish
Title of host publicationProceedings - 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006
EditorsYuanshun Dai, Mike Hinchey, Yi Pan
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages325-332
Number of pages8
ISBN (Print)0769525393, 9780769525396
DOIs
Publication statusPublished - 2006
Event2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006 - Indianapolis, IN, United States
Duration: 29 Sept 20061 Oct 2006

Other

Other2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006
Country/TerritoryUnited States
CityIndianapolis, IN
Period29/09/061/10/06

Bibliographical note

Copyright 2006 IEEE. Reprinted from Proceedings of the 2nd IEEE International symposium on dependable autonomic and secure computing (DASC 2006). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Fingerprint

Dive into the research topics of 'Analysing stream authentication protocols in autonomous agent-based systems'. Together they form a unique fingerprint.

Cite this