Architecture Design and Security Evaluation of Secure Optical Transport Network Using Formal Verification

被引:0
|
作者
Maeda, Shion [1 ]
Nakabayashi, Misato [2 ]
Okuda, Tetsuya [2 ]
机构
[1] Univ Tokyo, Tokyo, Japan
[2] NTT Social Informat Labs, Tokyo, Japan
关键词
Formal verification; IPsec; Quantum Key Distribution; Secure Optical Transport Network;
D O I
10.1109/COMPSAC54236.2022.00288
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this study, we designed and evaluated the Secure Optical Transport Network (SOTN) architecture, which is expected to be the mainstream of communications between datacenters in the future. We evaluated the security using formal verification and proposed countermeasures against possible adversary models. For the architecture design and evaluation, we referred to IPsec, which is the de-facto standard protocol for communication between datacenters. For the security evaluation, we used ProVerif, which is the de-facto standard of formal verification tools for cryptographic protocols. This study shows that an unknown attack (called the Key Compromised Disagreement (KCD) attack) is detected in the assumed adversary models and that the proposed countermeasures can reduce the impact of the KCD attack. The results suggest that unknown attacks can occur even for individually secure devices depending on their combinational and architectural designs and that the security of the entire architecture can be improved by applying an enhanced authentication mechanism to a specific communication channel.
引用
收藏
页码:1810 / 1815
页数:6
相关论文
共 50 条
  • [31] Towards the Formal Verification of Security Properties of a Network-on-Chip Router
    Sepulveda, Johanna
    Aboul-Hassan, Damian
    Sigl, Georg
    Becker, Bernd
    Sauer, Matthias
    2018 23RD IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2018,
  • [32] Formal specification and verification of resource bound security using PVS
    Yu, WJ
    Mok, AK
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 113 - 133
  • [33] Formal verification and security analysis of FastDFS using process algebra
    Hou, Zhiru
    Zhu, Huibiao
    INTERNET OF THINGS, 2025, 31
  • [34] Using temporal logics of knowledge in the formal verification of security protocols
    Dixon, C
    Gago, MCF
    Fisher, M
    van der Hoek, W
    11TH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS, 2004, : 148 - 151
  • [35] Formal verification of secure ad-hoc network routing protocols using deductive model-checking
    Buttyán L.
    Thong T.V.
    Periodica Polytechnica Electrical Engineering, 2011, 55 (1-2): : 31 - 43
  • [36] An Approach for Verification of Secure Access Control Using Security Pattern
    Gupta, Charu
    Singh, Rakesh Kumar
    Mohapatra, Amar Kumar
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [37] Formal Verification of a FIFO Component in Design of Network Monitoring Hardware
    Kratochvila, Tomas
    Rehak, Vojtech
    Safranek, David
    CESNET CONFERENCE 2006: FIRST CESNET CONFERENCE ON ADVANCED COMMUNICATIONS AND GRIDS, 2006, : 151 - 160
  • [38] Design of secure system architecture model for active network
    Xia, Zheng-You
    Zhang, Shi-Yong
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (08): : 1352 - 1360
  • [39] An evaluation of videogame network architecture performance and security
    Bryant, Blake
    Saiedian, Hossein
    COMPUTER NETWORKS, 2021, 192
  • [40] Network Security Architecture Based on Vulnerability Evaluation
    Li, June
    Wang, Tongqing
    Zhou, Dongru
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 104 - 109