Analysis of authentication protocols in agent-based systems using labeled tableaux

Ji Ma*, Mehmet A. Orgun, Abdul Sattar

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)
29 Downloads (Pure)

Abstract

The study of multiagent systems (MASs) focuses on systems in which many intelligent agents interact with each other using communication protocols. For example, an authentication protocol is used to verify and authorize agents acting on behalf of users to protect restricted data and information. After authentication, two agents should be entitled to believe that they are communicating with each other and not with intruders. For specifying and reasoning about the security properties of authentication protocols, many researchers have proposed the use of belief logics. Since authentication protocols are designed to operate in dynamic environments, it is important to model the evolution of authentication systems through time in a systematic way. We advocate the systematic combinations of logics of beliefs and time for modeling and reasoning about evolving agent beliefs in MASs. In particular, we use a temporal belief logic called TML+ for establishing trust theories for authentication systems and also propose a labeled tableau system for this logic. To illustrate the capabilities of TML+, we present trust theories for several well-known authentication protocols, namely, the Lowe modified wide-mouthed frog protocol, the amended NeedhamûSchroeder symmetric key protocol, and Kerberos. We also show how to verify certain security properties of those protocols. With the logic TML+ and its associated modal tableaux, we are able to reason about and verify authentication systems operating in dynamic environments.

Original languageEnglish
Pages (from-to)889-900
Number of pages12
JournalIEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Volume39
Issue number4
DOIs
Publication statusPublished - 2009

Bibliographical note

Copyright 2009 IEEE. Reprinted from IEEE Transactions on Systems, Man, and Cybernetics, Part B : Cybernetics. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Fingerprint

Dive into the research topics of 'Analysis of authentication protocols in agent-based systems using labeled tableaux'. Together they form a unique fingerprint.

Cite this