Architecture Design and Security Evaluation of Secure Optical Transport Network Using Formal Verification

被引:0
|
作者
Maeda, Shion [1 ]
Nakabayashi, Misato [2 ]
Okuda, Tetsuya [2 ]
机构
[1] Univ Tokyo, Tokyo, Japan
[2] NTT Social Informat Labs, Tokyo, Japan
关键词
Formal verification; IPsec; Quantum Key Distribution; Secure Optical Transport Network;
D O I
10.1109/COMPSAC54236.2022.00288
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this study, we designed and evaluated the Secure Optical Transport Network (SOTN) architecture, which is expected to be the mainstream of communications between datacenters in the future. We evaluated the security using formal verification and proposed countermeasures against possible adversary models. For the architecture design and evaluation, we referred to IPsec, which is the de-facto standard protocol for communication between datacenters. For the security evaluation, we used ProVerif, which is the de-facto standard of formal verification tools for cryptographic protocols. This study shows that an unknown attack (called the Key Compromised Disagreement (KCD) attack) is detected in the assumed adversary models and that the proposed countermeasures can reduce the impact of the KCD attack. The results suggest that unknown attacks can occur even for individually secure devices depending on their combinational and architectural designs and that the security of the entire architecture can be improved by applying an enhanced authentication mechanism to a specific communication channel.
引用
收藏
页码:1810 / 1815
页数:6
相关论文
共 50 条
  • [21] Applying The Flask Security Architecture to Secure SoC Design
    Hategekimana, Festus
    Bobda, Christophe
    2017 IEEE 25TH ANNUAL INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM 2017), 2017, : 198 - 198
  • [22] Formal verification of security model using SPR tool
    Kim, Il-Gon
    Kang, Miyoung
    Choi, Jin-Young
    Zegzhda, Peter D.
    Kalinin, Maxim O.
    Zegzhda, Dmitry P.
    Kang, Inhye
    COMPUTING AND INFORMATICS, 2006, 25 (05) : 353 - 368
  • [23] Formal analysis and verification of the PSTM architecture using CSP
    Liu, Ailun
    Zhu, Huibiao
    Popovic, Miroslav
    Xiang, Shuangqing
    Zhang, Lei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 165 (165)
  • [24] Security System Design and Verification for Zero Trust Architecture
    Lee, Sangdo
    Huh, Jun-Ho
    Woo, Hanchul
    ELECTRONICS, 2025, 14 (04):
  • [25] Optonomic: Architecture for Secure Autonomic Optical Transport Networks
    Sadasivarao, Abhinava
    Bardhan, Sanjoy
    Syed, Sharfuddin
    Lu, Biao
    Paraschis, Loukas
    2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019, : 321 - 328
  • [26] Router architecture evaluation for security network
    Yungho Choi
    Lark-Kyo Kim
    Hyungkeun Ahn
    Neungsoo Park
    Peer-to-Peer Networking and Applications, 2014, 7 : 628 - 635
  • [27] Router architecture evaluation for security network
    Choi, Yungho
    Kim, Lark-Kyo
    Ahn, Hyungkeun
    Park, Neungsoo
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 628 - 635
  • [28] Comment on "Design and formal security evaluation of NeMHIP"
    Wang, Ting
    Ji, Dongyao
    COMPUTERS & SECURITY, 2015, 52 : 159 - 161
  • [29] ArtiFact: Architecture and CAD Flow for Efficient Formal Verification of SoC Security Policies
    Nath, Atul Prasad Deb
    Bhunia, Swarup
    Ray, Sandip
    2018 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2018, : 411 - 416
  • [30] Wireless sensor network security: A secure sink node architecture
    Muhammad, S
    Furqan, Z
    Guha, R
    CONFERENCE PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE, 2005, : 371 - 376