Formally Reasoning About Security Issues in P2P Protocols: A Case Study
نویسندگان
چکیده
Peer-to-Peer (P2P) systems can be seen as highly dynamic distributed systems designed for very specific purposes, such as resources sharing in collaborative settings. Because of their ubiquity, it is fundamental to provide techniques for formally proving properties of the communication protocols underlying those systems. In this paper we present a formal specification of MUTE, a protocol for P2P systems, modelled in the SPL process calculus. Furthermore, we use the SPL reasoning techniques to show how the protocol enjoys a secrecy property against outsider attacks. By formally modeling and analyzing a real-world, yet informally specified protocol, we bear witness to the applicability of SPL as a formalism to specify security protocols as well as the flexibility of its reasoning techniques. This paper represents our first approach towards the use of process calculi, in particular SPL, for the specification and reasoning of P2P protocols.
منابع مشابه
Using a Declarative Process Language for P2P Protocols
Peer-to-Peer ( P2P ) systems can be seen as highly dy-namic distributed systems designed for very specific pur-poses, such as resources sharing in collaborative settings.Because of their ubiquity, it is fundamental to provide tech-niques for formally proving properties of the communica-tion protocols underlying those systems. In this paper wepresent a formal model of MUT...
متن کاملBayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication, content integrity or access control, presents several difficulties, most of them due to the decentralized nature of these environments and the lack of central authorities. Even though some solutions have been alread...
متن کاملFormal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks
As mobile ad hoc networks (MANETs) are increasingly deployed in critical environments, security becomes a paramount issue. The dynamic and decentralized nature of MANETs makes their protocols very vulnerable to attacks, for example, by malicious insiders, who can cause packets to be misrouted or cause other nodes to have improper configuration. This paper addresses security issues of auto-confi...
متن کاملA Secure Epidemic Based Update Protocol for P2p Systems
Epidemic Based Update Protocols Are Designed To Address The Consistency Issues For Data Replication In P2p Systems. However, Update Protocols Also Raise Security Issues. An Epidemic Based Update Protocol May Be Exposed To Security Threats When It Is Operated In An Untrustworthy P2p Environment. To Address This Issue, Security Prevention And Detection Protocols Are Designed In The Epidemic Based...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005