Architecture Design and Security Evaluation of Secure Optical Transport Network Using Formal Verification

被引:0
|
作者
Maeda, Shion [1 ]
Nakabayashi, Misato [2 ]
Okuda, Tetsuya [2 ]
机构
[1] Univ Tokyo, Tokyo, Japan
[2] NTT Social Informat Labs, Tokyo, Japan
关键词
Formal verification; IPsec; Quantum Key Distribution; Secure Optical Transport Network;
D O I
10.1109/COMPSAC54236.2022.00288
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this study, we designed and evaluated the Secure Optical Transport Network (SOTN) architecture, which is expected to be the mainstream of communications between datacenters in the future. We evaluated the security using formal verification and proposed countermeasures against possible adversary models. For the architecture design and evaluation, we referred to IPsec, which is the de-facto standard protocol for communication between datacenters. For the security evaluation, we used ProVerif, which is the de-facto standard of formal verification tools for cryptographic protocols. This study shows that an unknown attack (called the Key Compromised Disagreement (KCD) attack) is detected in the assumed adversary models and that the proposed countermeasures can reduce the impact of the KCD attack. The results suggest that unknown attacks can occur even for individually secure devices depending on their combinational and architectural designs and that the security of the entire architecture can be improved by applying an enhanced authentication mechanism to a specific communication channel.
引用
收藏
页码:1810 / 1815
页数:6
相关论文
共 50 条
  • [41] Formal modeling and verification of high-availability protocol for network security appliances
    Kim, Moonzoo
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2007, 4762 : 489 - 500
  • [42] Network architecture for optical path transport networks
    Okamoto, S
    Oguchi, K
    Sato, K
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1997, 45 (08) : 968 - 977
  • [43] A Design for a Secure Network of Networks Using a Hardware and Software Co-Engineering Architecture
    Mexis, Nico
    Anagnostopoulos, Nikolaos A.
    Chen, Shuai
    Bambach, Jan
    Arul, Tolga
    Katzenbeisser, Stefan
    PROCEEDINGS OF THE 2021 SIGCOMM 2021 POSTER AND DEMO SESSIONS, SIGCOMM 2021 DEMOS AND POSTERS, 2024, : 65 - 67
  • [44] Formal Verification of Taint-propagation Security Properties in a Commercial SoC Design
    Subramanyan, Pramod
    Arora, Divya
    2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
  • [45] Selfie's Reflections on Formal Verification for Transport Layer Security 1.3: Largely Opaque
    Kobeissi, Nadim
    IEEE SECURITY & PRIVACY, 2019, 17 (04) : 94 - 96
  • [46] Formal Verification of IEEE 802.16 Security Sublayer Using Scyther Tool
    Taha, Ahmed M.
    Abdel-Hamid, Amr T.
    Tahar, Sofiene
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 172 - +
  • [47] Secure and Robust Telemedicine Using ECC on Radix-8 With Formal Verification
    Kumar, Gautam
    Saini, Hemraj
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (01) : 13 - 28
  • [48] Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA
    Yogesh, Patil Rachana
    Satish, Devane R.
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 1334 - 1344
  • [49] A formal verification approach for composite smart contracts security using FSM
    Almakhour, Mouhamad
    Sliman, Layth
    Samhat, Abed Ellatif
    Mellouk, Abdelhamid
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (01) : 70 - 86
  • [50] Molecular transport network security using multi-wavelength optical spins
    Tunsiri, Surachai
    Thammawongsa, Nopparat
    Mitatha, Somsak
    Yupapin, Preecha P.
    ARTIFICIAL CELLS NANOMEDICINE AND BIOTECHNOLOGY, 2016, 44 (01) : 240 - 247