A Foundation for Tunnel-complex Protocols
نویسنده
چکیده
A FOUNDATION FOR TUNNEL-COMPLEX PROTOCOLS Alwyn E. Goodloe Carl A. Gunter Tunnel-complex protocols construct different tunnel topologies by directing tunnelestablishment protocols to set up pair-wise tunnels between different nodes, where the resulting tunnel complex satisfies some security requirement such as negotiating a defense in depth. Such protocols ease the burden on network managers deploying innovative solutions involving tunnel complexes to secure communication and protect networks. Tunnel-complex protocols exhibit subtleties relating to functional correctness and Denial of Service (DoS) that can benefit from formal analysis. We introduce a formalism called the tunnel calculus, which provides an operational semantics for a protocol stack incorporating the structures that maintain tunnel state as well the packet header transformations carried out by security tunnels. All subsequent analysis is based on this formalism. The tunnel calculus is applied to analyzing functional properties of both tunnel-establishment protocols and tunnel-complex protocols. The formalism is used to exhibit a situation where establishment protocol execution interacts with the state being installed so as to cause a deadlock. Noninterference and progress properties are formulated and proved in our framework showing the absence of this deadlock in a revised protocol. The utility of the tunnel calculus is illustrated in a number of case studies of discovery protocols that discover security gateways and set up tunnels to negotiate their traversal. For each protocol, we prove a functional completeness property that characterizes how the protocol delivers credentials to gateways as part of the negotiation process. We consider the the effectiveness of specific DoS protections for discovery protocols using a cost model for the tunnel calculus. In addition, we formulate and prove a theorem that says a particular class of attackers cannot induce the DoS-resistant protocol to perform high-cost activities.
منابع مشابه
An Investigation of the Seismic Interaction of Surface Foundations and Underground Cavities Using Finite Element Method
In this study, the seismic interaction of surface foundations and underground cavities was investigated. For this purpose, a parametric study of geometric dimensions of the foundation and cavity, their location, and the effect of the interaction between surface foundations and underground cavities was evaluated. The variable parameters include the ratio of the overburden height to the foundatio...
متن کاملAssessment of Tunnel Excavation on Surface Settlement
The expansion of underground structures is important in urban areas with high population density. In most large cities in the world, urban development is spreading along the structures. These structures are generally located at shallow depth; therefore study of shallow tunnels in urban areas is critical for development. During the excavation of tunnels in urban areas, creating the asymmetric se...
متن کاملNumerical Investigation on Effects of Deep Excavations’ Position on Existing Metro Tunnels in Urban Areas
Nowadays deep excavations are needed for construction of foundation of high rise buildings, providing space for parking and etc. In some cases deep excavations may be constructed in the vicinity of the subway tunnels and causes unpredicted extra displacements and internal forces in tunnel lining of tunnels which were not designed for them and consequently affect serviceability of tunnel. Theref...
متن کاملConcerning the Effect of a Viscoelastic Foundation on the Dynamic Stability of a Pipeline System Conveying an Incompressible Fluid
In this paper, we present an analytical method for solving a well-posed boundary value problem of mathematical physics governing the vibration characteristics of an internal flow propelled fluid-structure interaction where the pipeline segment is idealized as an elastic hollow beam conveying an incompressible fluid on a viscoelastic foundation. The effect of Coriolis and damping forces on the o...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کامل