Architecture Design and Security Evaluation of Secure Optical Transport Network Using Formal Verification

被引:0
|
作者
Maeda, Shion [1 ]
Nakabayashi, Misato [2 ]
Okuda, Tetsuya [2 ]
机构
[1] Univ Tokyo, Tokyo, Japan
[2] NTT Social Informat Labs, Tokyo, Japan
关键词
Formal verification; IPsec; Quantum Key Distribution; Secure Optical Transport Network;
D O I
10.1109/COMPSAC54236.2022.00288
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this study, we designed and evaluated the Secure Optical Transport Network (SOTN) architecture, which is expected to be the mainstream of communications between datacenters in the future. We evaluated the security using formal verification and proposed countermeasures against possible adversary models. For the architecture design and evaluation, we referred to IPsec, which is the de-facto standard protocol for communication between datacenters. For the security evaluation, we used ProVerif, which is the de-facto standard of formal verification tools for cryptographic protocols. This study shows that an unknown attack (called the Key Compromised Disagreement (KCD) attack) is detected in the assumed adversary models and that the proposed countermeasures can reduce the impact of the KCD attack. The results suggest that unknown attacks can occur even for individually secure devices depending on their combinational and architectural designs and that the security of the entire architecture can be improved by applying an enhanced authentication mechanism to a specific communication channel.
引用
收藏
页码:1810 / 1815
页数:6
相关论文
共 50 条
  • [1] A formal methodology for integral security design and verification of network protocols
    Diaz, Jesus
    Arroyo, David
    Rodriguez, Francisco B.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2014, 89 : 87 - 98
  • [2] Verifying cache architecture vulnerabilities using a formal security verification flow
    Ghasempouri, Tara
    Raik, Jaan
    Paul, Kolin
    Reinbrecht, Cezar
    Hamdioui, Said
    Mottaqiallah
    MICROELECTRONICS RELIABILITY, 2021, 119
  • [3] Formal Verification of an Efficient Architecture to Enhance the Security in IoT
    Elsayed, Eman K.
    Diab, L. S.
    Ibrahim, Asmaa A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (03) : 134 - 139
  • [4] Formal Verification of Secure Reconfigurable Scan Network Infrastructure
    Kochte, Michael A.
    Baranowski, Rafal
    Sauer, Matthias
    Becker, Bernd
    Wunderlich, Hans-Joachim
    2016 21TH IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2016,
  • [5] Evaluation of a Sensor Network node communication using Formal Verification
    Tariq, Mamoona
    Saghar, Kashif
    2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 268 - 271
  • [6] Secure Optical Transport Network
    Okuda T.
    Chida K.
    Shirai D.
    Chikara S.
    Saito T.
    Nakabayashi M.
    Yamamura K.
    Tanaka Y.
    Natsukawa K.
    Takasugi K.
    NTT Technical Review, 2022, 20 (01): : 32 - 39
  • [7] Design, architecture and performance evaluation of the wireless transport layer security
    Sklavos, N.
    Kitsos, P.
    Papadopoulos, K.
    Koufopavlou, O.
    JOURNAL OF SUPERCOMPUTING, 2006, 36 (01): : 33 - 50
  • [8] Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security
    N. Sklavos
    P. Kitsos
    K. Papadopoulos
    O. Koufopavlou
    The Journal of Supercomputing, 2006, 36 : 33 - 50
  • [9] Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN)
    Singh, Ninni
    Saini, Hemraj
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 375 - 388
  • [10] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642