Learn More
Non-repudiation allows an exchange of data between two principals in such a manner that the principals cannot subsequently deny their participation in the exchange. Current non-repudiation schemes, while providing a mandatory <i>proof of origin</i> service, generally provide only discretionary <i>proof of receipt</i> since it is difficult to enforce the(More)
– Many of the diverse Wireless Sensor Network (WSN) applications, such as home automation, traffic control and medical patient monitoring, have a strong requirement for the confidentiality of sensing data. At the same time, the restricted resources of WSN nodes demand that applications are implemented as efficiently as possible. Recently, the Advanced(More)
The increasing usage of internet-based services, such as certified e-mails, electronic payment of goods, and non-repudiation require development of security protocols for fair exchange. Non-repudiation is a security service concerned with preventing a denial by one of the principals involved in a communication of having participated in all or part of the(More)
Secure communications over insecure networks relies on the security of cryptographic protocols. Formal verification is an essential step in the design of security protocols. In particular logic-based verification has been shown to be effective and has discovered a number of protocol flaws. However, manual application of the deductive reasoning process is(More)
Cryptographic protocols are designed to provide security services, such as key distribution, authentication and non-repudiation, over insecure networks. Formal verification of these protocols is an important step in their design. The manual verification of security protocols using logic-based formal methods is susceptible to human-factor errors in correctly(More)
Nowadays mobile and fixed networks are trusted with highly sensitive information, which must be protected by security protocols. However, security protocols are vulnerable to a host of subtle attacks, such as replay, parallel session and type-flaw attacks. Designing protocols to be impervious to these attacks has been proven to be extremely challenging and(More)
Many peer-to-peer security protocols proposed for wireless communications use one-time shared secrets for authentication purposes. This paper analyses online update mechanisms for one-time shared secrets. A new type of attack against update mechanisms, called desynchronisation attack, is introduced. This type of attack may lead to a permanent denial of(More)