Intrusion detection in zero knowledge system using model checking approach

Teslin Jacob, Mithun Raman, Sanjay Singh*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The number of services provided to the modern users of todays' generation is countless and ever increasing. However, most of these services require the user to login with a username and a password. These sensitive information has to be sent across the network, which is highly insecure, and can be tapped by any unauthorized individual without much difficulty. The Zero Knowledge protocol provides authentication without the need to send any private and confidential information across the network. Only mathematical computations on these confidential information have to be sent across. In this paper, we have modeled the general working of the Zero Knowledge system by considering the various states that a prover (sender) and a verifier (receiver) will be in during the execution of the protocol, and have proved that the authentication of the prover is possible. Zero Knowledge system is usually considered to be unintrudeable, but that does not stop hackers from attempting to intrude this protocol. So in this paper, we have also considered the various states that an intruder will be in while intruding, and have shown that it is possible for the user to detect if somebody is trying to intrude the Zero Knowledge system. The tool used to model the system is NuSMV.

Original languageEnglish
Title of host publicationComputer Networks and Communications, NetCom 2012 - Proceedings of the Fourth International Conference on Networks and Communications
Pages453-465
Number of pages13
DOIs
Publication statusPublished - 03-10-2013
Event4th International Conference on Networks and Communications, NetCom 2012 - Chennai, India
Duration: 22-12-201224-12-2012

Publication series

NameLecture Notes in Electrical Engineering
Volume131 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference4th International Conference on Networks and Communications, NetCom 2012
Country/TerritoryIndia
CityChennai
Period22-12-1224-12-12

All Science Journal Classification (ASJC) codes

  • Industrial and Manufacturing Engineering

Fingerprint

Dive into the research topics of 'Intrusion detection in zero knowledge system using model checking approach'. Together they form a unique fingerprint.

Cite this