Formal prototyping in early stages of protocol design

  • Authors:
  • Alwyn Goodloe;Carl A. Gunter;Mark-Oliver Stehr

  • Affiliations:
  • University of Pennsylvania;University of Illinois at Urbana-Champaign;University of Illinois at Urbana-Champaign

  • Venue:
  • WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Network protocol design is usually an informal process where debugging is based on successive iterations of a prototype implementation. The feedback provided by a prototype can be indispensable since the requirements are often incomplete at the start. A draw-back of this technique is that errors in protocols can be notoriously difficult to detect by testing alone. Applying formal methods such as theorem proving can greatly increase one's confidence that the protocol is correct. However, formal methods can be tedious to use, rarely support successive design iterations and prototyping, are difficult to scale to entire designs, and typically require a clear understanding of requirements in advance. We investigate how formal simulation based on Maude executable specifications overcomes many of these hurdles. We apply this technique in the early stages of the design of a new security protocol, known as Layer 3 Accounting (L3A), aimed at protecting known vulnerabilities in the wireless accounting infrastructure. The protocol sets up a collection of IPsec security associations that provide the necessary protection. We demonstrate how formal simulation uncovered problems in several successive iterations of the L3A protocol design.