A Foundation for Tunnel-complex Protocols

نویسنده

  • Alwyn E. Goodloe
چکیده

A FOUNDATION FOR TUNNEL-COMPLEX PROTOCOLS Alwyn E. Goodloe Carl A. Gunter Tunnel-complex protocols construct different tunnel topologies by directing tunnelestablishment protocols to set up pair-wise tunnels between different nodes, where the resulting tunnel complex satisfies some security requirement such as negotiating a defense in depth. Such protocols ease the burden on network managers deploying innovative solutions involving tunnel complexes to secure communication and protect networks. Tunnel-complex protocols exhibit subtleties relating to functional correctness and Denial of Service (DoS) that can benefit from formal analysis. We introduce a formalism called the tunnel calculus, which provides an operational semantics for a protocol stack incorporating the structures that maintain tunnel state as well the packet header transformations carried out by security tunnels. All subsequent analysis is based on this formalism. The tunnel calculus is applied to analyzing functional properties of both tunnel-establishment protocols and tunnel-complex protocols. The formalism is used to exhibit a situation where establishment protocol execution interacts with the state being installed so as to cause a deadlock. Noninterference and progress properties are formulated and proved in our framework showing the absence of this deadlock in a revised protocol. The utility of the tunnel calculus is illustrated in a number of case studies of discovery protocols that discover security gateways and set up tunnels to negotiate their traversal. For each protocol, we prove a functional completeness property that characterizes how the protocol delivers credentials to gateways as part of the negotiation process. We consider the the effectiveness of specific DoS protections for discovery protocols using a cost model for the tunnel calculus. In addition, we formulate and prove a theorem that says a particular class of attackers cannot induce the DoS-resistant protocol to perform high-cost activities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Investigation of the Seismic Interaction of Surface Foundations and Underground Cavities Using Finite Element Method

In this study, the seismic interaction of surface foundations and underground cavities was investigated. For this purpose, a parametric study of geometric dimensions of the foundation and cavity, their location, and the effect of the interaction between surface foundations and underground cavities was evaluated. The variable parameters include the ratio of the overburden height to the foundatio...

متن کامل

Assessment of Tunnel Excavation on Surface Settlement

The expansion of underground structures is important in urban areas with high population density. In most large cities in the world, urban development is spreading along the structures. These structures are generally located at shallow depth; therefore study of shallow tunnels in urban areas is critical for development. During the excavation of tunnels in urban areas, creating the asymmetric se...

متن کامل

Numerical Investigation on Effects of Deep Excavations’ Position on Existing Metro Tunnels in Urban Areas

Nowadays deep excavations are needed for construction of foundation of high rise buildings, providing space for parking and etc. In some cases deep excavations may be constructed in the vicinity of the subway tunnels and causes unpredicted extra displacements and internal forces in tunnel lining of tunnels which were not designed for them and consequently affect serviceability of tunnel. Theref...

متن کامل

Concerning the Effect of a Viscoelastic Foundation on the Dynamic Stability of a Pipeline System Conveying an Incompressible Fluid

In this paper, we present an analytical method for solving a well-posed boundary value problem of mathematical physics governing the vibration characteristics of an internal flow propelled fluid-structure interaction where the pipeline segment is idealized as an elastic hollow beam conveying an incompressible fluid on a viscoelastic foundation. The effect of Coriolis and damping forces on the o...

متن کامل

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008