Skip to main content

Belief Manipulation: A Formal Model of Deceit in Message Passing Systems

  • Conference paper
Intelligence and Security Informatics (PAISI 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8039))

Included in the following conference series:

  • 765 Accesses

Abstract

A dishonest participant in a message exchange is often interested in trying to convince others to hold particular, erroneous beliefs. While the study of belief change has a long history, to date there has not been a great deal of interest in modelling the conscious manipulation of others beliefs. In this paper, we introduce a formal definition of a belief manipulation problem. The definition relies on well-known concepts from Artificial Intelligence and the theory of belief change, and it is highly amenable to implementation using existing tools. We discuss applications of belief manipulation in two important domains: cryptographic protocol verification and Smart Grid security. In each of these domains, it is clear that many security problems can be abstracted and analyzed in terms of formal belief manipulation problems. The focus of this paper is on introducing a new problem of general interest in Security, and taking the first steps towards practical application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aiello, L., Massacci, F.: Planning attacks to security protocols: Case studies in logic programming. In: Kakas, A.C., Sadri, F. (eds.) Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I (2001)

    Google Scholar 

  2. Alchourrón, C., Gärdenfors, P., Makinson, D.: On the logic of theory change: Partial meet functions for contraction and revision. Journal of Symbolic Logic 50(2), 510–530 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  3. Armando, A., Compagna, L., Lierler, Y.: Automatic Compilation of Protocol Insecurity Problems into Logic Programming. In: Alferes, J.J., Leite, J. (eds.) JELIA 2004. LNCS (LNAI), vol. 3229, pp. 617–627. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)

    Article  Google Scholar 

  5. Cremers, C.J.F.: The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Delgrande, J.P., Hunter, A., Schaub, T.: COBA: A Consistency-Based Belief Revision System. In: Flesca, S., Greco, S., Leone, N., Ianni, G. (eds.) JELIA 2002. LNCS (LNAI), vol. 2424, pp. 509–512. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Dolev, D., Yao, A.C.: On the Security of Public Key Protocols. IEEE Trans. on Inf. Theory 2(29), 198–208 (1983)

    Article  MathSciNet  Google Scholar 

  8. Grove, A.: Two Modellings for Theory Change. Journal of Philosophical Logic 17, 157–170 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  9. Halpern, J., Pucella, R.: On the Relationship between Strand Spaces and Multi-Agent Systems. CoRR, cs.CR/0306107 (2003)

    Google Scholar 

  10. Hunter, A., Delgrande, J.P.: Belief Change and Cryptographic Protocol Verification. In: Proceedings of AAAI (2007)

    Google Scholar 

  11. Hunter, A., Delgrande, J.P., McBride, R.: Protocol Verification in a Theory of Action. In: Zaïane, O.R., Zilles, S. (eds.) Canadian AI 2013. LNCS, vol. 7884, pp. 52–63. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  12. Katsuno, H., Mendelzon, A.O.: On The Difference Between Updating a Knowledge Base and Revising It. In: Proceedings of the Second International Conference on Principles of Knowledge Representation and Reasoning (KR 1991), pp. 387–394 (1991)

    Google Scholar 

  13. McDaniel, P., McLaughlin, S.: Security and Privacy Challenges in the Smart Grid. IEEE Security and Privacy 7(3), 75–77 (2009)

    Article  Google Scholar 

  14. Spohn, W.: Ordinal Conditional Functions. A Dynamic Theory of Epistemic States. In: Causation in Decision, Belief Change, and Statistics, vol. II, pp. 105–134 (1988)

    Google Scholar 

  15. Thayer, J., Herzog, J., Guttman, J.: Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security 7(2-3), 191–230 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hunter, A. (2013). Belief Manipulation: A Formal Model of Deceit in Message Passing Systems. In: Wang, G.A., Zheng, X., Chau, M., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2013. Lecture Notes in Computer Science, vol 8039. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39693-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39693-9_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39692-2

  • Online ISBN: 978-3-642-39693-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics