{"title":"Design, verification and implementation of an authentication protocol","authors":"Thomas Y. C. Woo, S. Lam","doi":"10.1109/ICNP.1994.344373","DOIUrl":"https://doi.org/10.1109/ICNP.1994.344373","url":null,"abstract":"We present an account of the entire development cycle (i.e., design, specification and verification, and implementation) of a realistic authentication protocol, which is part of a security architecture proposed by us. The protocol's design follows a stepwise refinement process, which we illustrate. Our account of its specification and verification provides a practical demonstration of a proposed formal analysis approach. For its implementation, we adopt the GSS-API standard. We describe the mapping from our protocol to GSS-API, which can serve as a reference for other protocol implementations. We believe that the global perspective presented in this paper would be of great value to protocol designers, verifiers, and implementers, and contribute toward bridging the gap between the theory and practice of authentication protocol design.<<ETX>>","PeriodicalId":275870,"journal":{"name":"Proceedings of ICNP - 1994 International Conference on Network Protocols","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129705321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hiroyuki Sakakibara, Kazunori Seki, Ken-ichi Okada, Y. Matsushita
{"title":"The ID-based non-interactive group communication key sharing scheme using smart cards","authors":"Hiroyuki Sakakibara, Kazunori Seki, Ken-ichi Okada, Y. Matsushita","doi":"10.1109/ICNP.1994.344372","DOIUrl":"https://doi.org/10.1109/ICNP.1994.344372","url":null,"abstract":"Attention to CSCW has been increasing, resulting in greater needs for secure group communication. In order to realize secure group communication, data which is sent from a member to other members of a group should be encrypted by the cryptographic communication key of the group. We propose an identity-based non-interactive group communication key sharing scheme using smart cards based on the modified copy key (MCK) method. We assume that the smart cards contain the key generators and are secure for tampering. Each user has a smart card and a key generator. A user can generate a group communication key non-interactively with his key generator and the IDs of the other group members using his smart card.<<ETX>>","PeriodicalId":275870,"journal":{"name":"Proceedings of ICNP - 1994 International Conference on Network Protocols","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132681617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the construction of multiphase communication protocols","authors":"Gurdip Singh, Madhavi Sammeta","doi":"10.1109/ICNP.1994.344365","DOIUrl":"https://doi.org/10.1109/ICNP.1994.344365","url":null,"abstract":"The complexity of communication protocols has led to compositional techniques to design and verify protocols. We propose a framework for sequential composition of protocols. We identify two types of interactions, ordering and inhibition, required to specify such compositions. By describing these interactions separately, our framework enhances the applicability to the technique to a larger class of protocols. The technique facilitates modular design and verification. We illustrate the use of our technique by deriving several protocols.<<ETX>>","PeriodicalId":275870,"journal":{"name":"Proceedings of ICNP - 1994 International Conference on Network Protocols","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115491327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalized fair reachability analysis for cyclic protocols: decidability for logical correctness problems","authors":"Hong Liu, Raymond E. Miller","doi":"10.1109/ICNP.1994.344371","DOIUrl":"https://doi.org/10.1109/ICNP.1994.344371","url":null,"abstract":"In a previous paper, we generalized the fair reachability notion to cyclic protocols with n/spl ges/2 machines and showed that deadlock detection is decidable for /spl Pscr/, the class of cyclic protocols whose fair reachable state spaces are finite. In this paper, we show that detection of unspecified receptions, unboundedness, and nonexecutable transitions are all decidable for class /spl Pscr/ via finite extension of the fair reachable state space. This study shows that for the class /spl Pscr/, our generalized fair reachability analysis technique not only achieves substantial state reduction but also maintains very competitive logical error coverage. Therefore, it is a viable state reduction technique.<<ETX>>","PeriodicalId":275870,"journal":{"name":"Proceedings of ICNP - 1994 International Conference on Network Protocols","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116282404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single-link and time communicating finite state machines","authors":"W. Peng","doi":"10.1109/ICNP.1994.344368","DOIUrl":"https://doi.org/10.1109/ICNP.1994.344368","url":null,"abstract":"We propose two variants of the classical communicating finite state machines (CFSMs) model, single-link communicating finite state machines (SLCFSMs) and time communicating finite state machines (TCFSMs). For SLCFSMs the notion of well-formedness, which provides a necessary condition for SLCFSMs to be free of some logical errors, is proposed. For TCFSMs, it is argued that they are more suitable for modeling delay-sensitive distributed algorithms/communication protocols. Two practical communication protocols, a token ring and a sliding window protocol, are modeled using TCFSMs.<<ETX>>","PeriodicalId":275870,"journal":{"name":"Proceedings of ICNP - 1994 International Conference on Network Protocols","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126311223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic retransmission rather than automatic repeat request","authors":"A. Al-Zoman, J. DeDourek, B. Kurz","doi":"10.1109/ICNP.1994.344377","DOIUrl":"https://doi.org/10.1109/ICNP.1994.344377","url":null,"abstract":"The standard HDLC family of protocols has been designed for low to moderate BERs. But as BER increases frequent losses or corruptions of certain frames will cause extensive timeout recovery. Too many timeouts means low throughput. A new retransmission scheme is presented which depends on the transmitter to automatically initiate retransmission instead of the conventional way where the receiver automatically requests retransmission. The retransmission strategy is based on two ideas: the receiver can report without any restriction its buffer status by using a multiple acknowledgement frame and the transmitter keeps a record of the transmission order in which frames were sent. This new approach significantly reduces the use of timeout recoveries, and hence it gives a higher throughput efficiency than the standard and extended HDLC protocols.<<ETX>>","PeriodicalId":275870,"journal":{"name":"Proceedings of ICNP - 1994 International Conference on Network Protocols","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125945625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An iterative approach to comprehensive performance evaluation of integrated services networks","authors":"I. Matta, A. Shankar","doi":"10.1109/ICNP.1994.344378","DOIUrl":"https://doi.org/10.1109/ICNP.1994.344378","url":null,"abstract":"Future networks are expected to integrate diverse services. For this purpose, new algorithms and protocols have been proposed for link scheduling, admission control, and routing. The interaction between these three components is crucial to the performance of the network. However, this interaction is difficult to model realistically using available techniques. We present an iterative discrete-time approach that yields a realistic model which takes into account this interaction. The model applies to connection-oriented networks with different types of real-time connections. It allows the investigation of various control schemes for both transient and steady-state performances. Preliminary results indicate that our approach is computationally much cheaper than discrete-event simulation, and yields sufficiently accurate performance measures.<<ETX>>","PeriodicalId":275870,"journal":{"name":"Proceedings of ICNP - 1994 International Conference on Network Protocols","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123819448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stutter XOR strategies: a new class of multicopy ARQ strategies","authors":"M. Aghadavoodi Jolfaei","doi":"10.1109/ICNP.1994.344376","DOIUrl":"https://doi.org/10.1109/ICNP.1994.344376","url":null,"abstract":"On systems consisting of packet switched networks (e.g. LANs, HSLANs and ATM/BISDN) which are linked over satellite, there are packet losses due to buffer overflow at bridges and routers as well as bit errors on the satellite link. The resulting high error probability requires error correction methods, which are simple and effective in terms of throughput and memory requirements. For packet switched communications, quite a number of ARQ (automatic repeat request) protocols have been designed which are able to cope with stringent memory requirements, but they either lack safety at high block error rates, or they require a large bandwidth due to low throughput. We introduce a simple and effective strategy (called Stutter-XOR or SXOR strategy) to increase throughput of existing protocols. In contrast to existing hybrid schemes (combinations of ARQ and forward error correction), it does not only correct bit errors, but also handles block losses. This is achieved by sending additional blocks, so called XOR blocks, which are created by combining other block using the XOR (modulo 2 addition) operation. We developed several variants of this strategy. Two of them are evaluated by means of analysis and simulation.<<ETX>>","PeriodicalId":275870,"journal":{"name":"Proceedings of ICNP - 1994 International Conference on Network Protocols","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123487006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}