DocumentCode :
3310458
Title :
Reduction-based security analysis of Internet routing protocols
Author :
Chen Chen ; Limin Jia ; Boon Thau Loo ; Wenchao Zhou
Author_Institution :
Univ. of Pennsylvania, Philadelphia, PA, USA
fYear :
2012
fDate :
Oct. 30 2012-Nov. 2 2012
Firstpage :
1
Lastpage :
6
Abstract :
In recent years, there have been strong interests in the networking community in designing new Internet architectures that provide strong security guarantees. However, none of these proposals back their security claims by formal analysis. In this paper, we use a reduction-based approach to prove the route authenticity property in secure routing protocols. These properties require routes announced by honest nodes in the network not to be tampered with by the adversary. We focus on protocols that rely on layered signatures to provide security: each route announcement is associated with a list of signatures attesting the authenticity of its subpaths. Our approach combines manual proofs with automated analysis. We define several reduction steps to reduce proving route authenticity properties to simple conditions that can be automatically checked by the Proverif tool. We show that our analysis is correct with respect to the trace semantics of the routing protocols.
Keywords :
Internet; computer network security; routing protocols; Internet routing protocols; Proverif tool; formal analysis; reduction-based security analysis; route authenticity; Internet; Routing; Routing protocols; Security; Semantics; Topology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Protocols (ICNP), 2012 20th IEEE International Conference on
Conference_Location :
Austin, TX
Print_ISBN :
978-1-4673-2445-8
Electronic_ISBN :
978-1-4673-2446-5
Type :
conf
DOI :
10.1109/ICNP.2012.6459941
Filename :
6459941
Link To Document :
بازگشت