Intrusion detection in zero knowledge system using model checking approach

Teslin Jacob, Mithun Raman, Sanjay Singh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The number of services provided to the modern users of todays' generation is countless and ever increasing. However, most of these services require the user to login with a username and a password. These sensitive information has to be sent across the network, which is highly insecure, and can be tapped by any unauthorized individual without much difficulty. The Zero Knowledge protocol provides authentication without the need to send any private and confidential information across the network. Only mathematical computations on these confidential information have to be sent across. In this paper, we have modeled the general working of the Zero Knowledge system by considering the various states that a prover (sender) and a verifier (receiver) will be in during the execution of the protocol, and have proved that the authentication of the prover is possible. Zero Knowledge system is usually considered to be unintrudeable, but that does not stop hackers from attempting to intrude this protocol. So in this paper, we have also considered the various states that an intruder will be in while intruding, and have shown that it is possible for the user to detect if somebody is trying to intrude the Zero Knowledge system. The tool used to model the system is NuSMV.

Original languageEnglish
Title of host publicationComputer Networks and Communications, NetCom 2012 - Proceedings of the Fourth International Conference on Networks and Communications
Pages453-465
Number of pages13
DOIs
Publication statusPublished - 03-10-2013
Event4th International Conference on Networks and Communications, NetCom 2012 - Chennai, India
Duration: 22-12-201224-12-2012

Publication series

NameLecture Notes in Electrical Engineering
Volume131 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference4th International Conference on Networks and Communications, NetCom 2012
CountryIndia
CityChennai
Period22-12-1224-12-12

Fingerprint

Model checking
Intrusion detection
Network protocols
Authentication

All Science Journal Classification (ASJC) codes

  • Industrial and Manufacturing Engineering

Cite this

Jacob, T., Raman, M., & Singh, S. (2013). Intrusion detection in zero knowledge system using model checking approach. In Computer Networks and Communications, NetCom 2012 - Proceedings of the Fourth International Conference on Networks and Communications (pp. 453-465). (Lecture Notes in Electrical Engineering; Vol. 131 LNEE). https://doi.org/10.1007/978-1-4614-6154-8_45
Jacob, Teslin ; Raman, Mithun ; Singh, Sanjay. / Intrusion detection in zero knowledge system using model checking approach. Computer Networks and Communications, NetCom 2012 - Proceedings of the Fourth International Conference on Networks and Communications. 2013. pp. 453-465 (Lecture Notes in Electrical Engineering).
@inproceedings{e1fed809cd524ebb87744fcd3c5ff358,
title = "Intrusion detection in zero knowledge system using model checking approach",
abstract = "The number of services provided to the modern users of todays' generation is countless and ever increasing. However, most of these services require the user to login with a username and a password. These sensitive information has to be sent across the network, which is highly insecure, and can be tapped by any unauthorized individual without much difficulty. The Zero Knowledge protocol provides authentication without the need to send any private and confidential information across the network. Only mathematical computations on these confidential information have to be sent across. In this paper, we have modeled the general working of the Zero Knowledge system by considering the various states that a prover (sender) and a verifier (receiver) will be in during the execution of the protocol, and have proved that the authentication of the prover is possible. Zero Knowledge system is usually considered to be unintrudeable, but that does not stop hackers from attempting to intrude this protocol. So in this paper, we have also considered the various states that an intruder will be in while intruding, and have shown that it is possible for the user to detect if somebody is trying to intrude the Zero Knowledge system. The tool used to model the system is NuSMV.",
author = "Teslin Jacob and Mithun Raman and Sanjay Singh",
year = "2013",
month = "10",
day = "3",
doi = "10.1007/978-1-4614-6154-8_45",
language = "English",
isbn = "9781461461531",
series = "Lecture Notes in Electrical Engineering",
pages = "453--465",
booktitle = "Computer Networks and Communications, NetCom 2012 - Proceedings of the Fourth International Conference on Networks and Communications",

}

Jacob, T, Raman, M & Singh, S 2013, Intrusion detection in zero knowledge system using model checking approach. in Computer Networks and Communications, NetCom 2012 - Proceedings of the Fourth International Conference on Networks and Communications. Lecture Notes in Electrical Engineering, vol. 131 LNEE, pp. 453-465, 4th International Conference on Networks and Communications, NetCom 2012, Chennai, India, 22-12-12. https://doi.org/10.1007/978-1-4614-6154-8_45

Intrusion detection in zero knowledge system using model checking approach. / Jacob, Teslin; Raman, Mithun; Singh, Sanjay.

Computer Networks and Communications, NetCom 2012 - Proceedings of the Fourth International Conference on Networks and Communications. 2013. p. 453-465 (Lecture Notes in Electrical Engineering; Vol. 131 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Intrusion detection in zero knowledge system using model checking approach

AU - Jacob, Teslin

AU - Raman, Mithun

AU - Singh, Sanjay

PY - 2013/10/3

Y1 - 2013/10/3

N2 - The number of services provided to the modern users of todays' generation is countless and ever increasing. However, most of these services require the user to login with a username and a password. These sensitive information has to be sent across the network, which is highly insecure, and can be tapped by any unauthorized individual without much difficulty. The Zero Knowledge protocol provides authentication without the need to send any private and confidential information across the network. Only mathematical computations on these confidential information have to be sent across. In this paper, we have modeled the general working of the Zero Knowledge system by considering the various states that a prover (sender) and a verifier (receiver) will be in during the execution of the protocol, and have proved that the authentication of the prover is possible. Zero Knowledge system is usually considered to be unintrudeable, but that does not stop hackers from attempting to intrude this protocol. So in this paper, we have also considered the various states that an intruder will be in while intruding, and have shown that it is possible for the user to detect if somebody is trying to intrude the Zero Knowledge system. The tool used to model the system is NuSMV.

AB - The number of services provided to the modern users of todays' generation is countless and ever increasing. However, most of these services require the user to login with a username and a password. These sensitive information has to be sent across the network, which is highly insecure, and can be tapped by any unauthorized individual without much difficulty. The Zero Knowledge protocol provides authentication without the need to send any private and confidential information across the network. Only mathematical computations on these confidential information have to be sent across. In this paper, we have modeled the general working of the Zero Knowledge system by considering the various states that a prover (sender) and a verifier (receiver) will be in during the execution of the protocol, and have proved that the authentication of the prover is possible. Zero Knowledge system is usually considered to be unintrudeable, but that does not stop hackers from attempting to intrude this protocol. So in this paper, we have also considered the various states that an intruder will be in while intruding, and have shown that it is possible for the user to detect if somebody is trying to intrude the Zero Knowledge system. The tool used to model the system is NuSMV.

UR - http://www.scopus.com/inward/record.url?scp=84884725503&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84884725503&partnerID=8YFLogxK

U2 - 10.1007/978-1-4614-6154-8_45

DO - 10.1007/978-1-4614-6154-8_45

M3 - Conference contribution

SN - 9781461461531

T3 - Lecture Notes in Electrical Engineering

SP - 453

EP - 465

BT - Computer Networks and Communications, NetCom 2012 - Proceedings of the Fourth International Conference on Networks and Communications

ER -

Jacob T, Raman M, Singh S. Intrusion detection in zero knowledge system using model checking approach. In Computer Networks and Communications, NetCom 2012 - Proceedings of the Fourth International Conference on Networks and Communications. 2013. p. 453-465. (Lecture Notes in Electrical Engineering). https://doi.org/10.1007/978-1-4614-6154-8_45