[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/ICNP.2012.6459941guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Reduction-based security analysis of Internet routing protocols

Published: 30 October 2012 Publication History

Abstract

In recent years, there have been strong interests in the networking community in designing new Internet architectures that provide strong security guarantees. However, none of these proposals back their security claims by formal analysis. In this paper, we use a reduction-based approach to prove the route authenticity property in secure routing protocols. These properties require routes announced by honest nodes in the network not to be tampered with by the adversary. We focus on protocols that rely on layered signatures to provide security: each route announcement is associated with a list of signatures attesting the authenticity of its subpaths. Our approach combines manual proofs with automated analysis. We define several reduction steps to reduce proving route authenticity properties to simple conditions that can be automatically checked by the Proverif tool. We show that our analysis is correct with respect to the trace semantics of the routing protocols.

Cited By

View all
  • (2014)Mechanized Network Origin and Path Authenticity ProofsProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660349(346-357)Online publication date: 3-Nov-2014
  1. Reduction-based security analysis of Internet routing protocols

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ICNP '12: Proceedings of the 2012 20th IEEE International Conference on Network Protocols (ICNP)
    October 2012
    403 pages
    ISBN:9781467324458

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 30 October 2012

    Author Tags

    1. Internet
    2. Routing
    3. Routing protocols
    4. Security
    5. Semantics
    6. Topology

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)Mechanized Network Origin and Path Authenticity ProofsProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660349(346-357)Online publication date: 3-Nov-2014

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media