Analysing routing protocols: four nodes topologies are sufficient

Véronique Cortier 1 Jan Degrieck 1, 2 Stéphanie Delaune 2
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
2 SECSI - Security of information systems
LSV - Laboratoire Spécification et Vérification [Cachan], ENS Cachan - École normale supérieure - Cachan, Inria Saclay - Ile de France, CNRS - Centre National de la Recherche Scientifique : UMR8643
Abstract : Routing protocols aim at establishing a route between nodes on a network. Secured versions of routing protocols have been proposed in order to provide more guarantees on the resulting routes. Formal methods have proved their usefulness when analysing standard security protocols such as confidentiality or authentication protocols. However, existing results and tools do not apply to routing protocols. This is due in particular to the fact that all possible topologies (infinitely many) have to be considered. \par In this paper, we propose a simple reduction result: when looking for attacks on properties such as the validity of the route, it is sufficient to consider topologies with only four nodes, resulting in a number of just five distinct topologies to consider. As an application, we analyse the SRP applied to DSR and the SDMSR protocols using the ProVerif tool.
Type de document :
Communication dans un congrès
Pierpaolo Degano and Joshua D. Guttman. 1st International Conference on Principles of Security and Trust (POST'12), Mar 2012, Tallinn, Estonia. Springer, 7215, pp.30--50, 2012, Lecture Notes in Computer Science. 〈10.1007/978-3-642-28641-4_3〉
Liste complète des métadonnées

https://hal.inria.fr/hal-00732911
Contributeur : Véronique Cortier <>
Soumis le : lundi 17 septembre 2012 - 13:30:36
Dernière modification le : vendredi 6 juillet 2018 - 15:06:10

Lien texte intégral

Identifiants

Citation

Véronique Cortier, Jan Degrieck, Stéphanie Delaune. Analysing routing protocols: four nodes topologies are sufficient. Pierpaolo Degano and Joshua D. Guttman. 1st International Conference on Principles of Security and Trust (POST'12), Mar 2012, Tallinn, Estonia. Springer, 7215, pp.30--50, 2012, Lecture Notes in Computer Science. 〈10.1007/978-3-642-28641-4_3〉. 〈hal-00732911〉

Partager

Métriques

Consultations de la notice

464