Formal Validation of Security Properties of AMT's Three-Way Handshake

Multicasting is a technique for transmitting the same information to multiple receivers over IP networks. It is often deployed on streaming media applications over the Internet and private networks. The biggest problem multicast introduces today is that it is an all or nothing solution. Every eleme...

Full description

Bibliographic Details
Main Author: Salem, Ali Mohamad
Format: Others
Published: 2011
Online Access:http://spectrum.library.concordia.ca/7324/1/Salem_MSc_S2011.pdf
Salem, Ali Mohamad <http://spectrum.library.concordia.ca/view/creators/Salem=3AAli_Mohamad=3A=3A.html> (2011) Formal Validation of Security Properties of AMT's Three-Way Handshake. Masters thesis, Concordia University.
id ndltd-LACETR-oai-collectionscanada.gc.ca-QMG.7324
record_format oai_dc
spelling ndltd-LACETR-oai-collectionscanada.gc.ca-QMG.73242013-10-22T03:44:36Z Formal Validation of Security Properties of AMT's Three-Way Handshake Salem, Ali Mohamad Multicasting is a technique for transmitting the same information to multiple receivers over IP networks. It is often deployed on streaming media applications over the Internet and private networks. The biggest problem multicast introduces today is that it is an all or nothing solution. Every element on the path between the source and the receivers (links, routers, firewalls) requires multicast protocols to be enabled. Furthermore, multicast has a conceptual business model, and therefore is not an easy case to make. These factors, embedded deep in technology, but ultimately shaped by economics, led to a lack of multicast deployment. To address this problem, the AMT (Automatic IP Multicast without explicit Tunnels) specification has been developed by the Network Working Group at the IETF. This specification is designed to provide a mechanism for a migration path to a fully multicast-enabled backbone. It allows multicast to reach unicast-only receivers without the need for any explicit tunnels between the receiver and the source. We have formally validated the three-way handshake in the AMT specification using AVISPA against two main security goals: secrecy and authentication. We have demonstrated that the authentication goal is not met: an attacker can masquerade as an AMT relay, and the AMT gateway (at the end user) cannot distinguish a valid relay from an invalid one. Another attack was also found where an intruder can disconnect or shutdown a valid session for a valid end-user using a replay attack. 2011-04-15 Thesis NonPeerReviewed application/pdf http://spectrum.library.concordia.ca/7324/1/Salem_MSc_S2011.pdf Salem, Ali Mohamad <http://spectrum.library.concordia.ca/view/creators/Salem=3AAli_Mohamad=3A=3A.html> (2011) Formal Validation of Security Properties of AMT's Three-Way Handshake. Masters thesis, Concordia University. http://spectrum.library.concordia.ca/7324/
collection NDLTD
format Others
sources NDLTD
description Multicasting is a technique for transmitting the same information to multiple receivers over IP networks. It is often deployed on streaming media applications over the Internet and private networks. The biggest problem multicast introduces today is that it is an all or nothing solution. Every element on the path between the source and the receivers (links, routers, firewalls) requires multicast protocols to be enabled. Furthermore, multicast has a conceptual business model, and therefore is not an easy case to make. These factors, embedded deep in technology, but ultimately shaped by economics, led to a lack of multicast deployment. To address this problem, the AMT (Automatic IP Multicast without explicit Tunnels) specification has been developed by the Network Working Group at the IETF. This specification is designed to provide a mechanism for a migration path to a fully multicast-enabled backbone. It allows multicast to reach unicast-only receivers without the need for any explicit tunnels between the receiver and the source. We have formally validated the three-way handshake in the AMT specification using AVISPA against two main security goals: secrecy and authentication. We have demonstrated that the authentication goal is not met: an attacker can masquerade as an AMT relay, and the AMT gateway (at the end user) cannot distinguish a valid relay from an invalid one. Another attack was also found where an intruder can disconnect or shutdown a valid session for a valid end-user using a replay attack.
author Salem, Ali Mohamad
spellingShingle Salem, Ali Mohamad
Formal Validation of Security Properties of AMT's Three-Way Handshake
author_facet Salem, Ali Mohamad
author_sort Salem, Ali Mohamad
title Formal Validation of Security Properties of AMT's Three-Way Handshake
title_short Formal Validation of Security Properties of AMT's Three-Way Handshake
title_full Formal Validation of Security Properties of AMT's Three-Way Handshake
title_fullStr Formal Validation of Security Properties of AMT's Three-Way Handshake
title_full_unstemmed Formal Validation of Security Properties of AMT's Three-Way Handshake
title_sort formal validation of security properties of amt's three-way handshake
publishDate 2011
url http://spectrum.library.concordia.ca/7324/1/Salem_MSc_S2011.pdf
Salem, Ali Mohamad <http://spectrum.library.concordia.ca/view/creators/Salem=3AAli_Mohamad=3A=3A.html> (2011) Formal Validation of Security Properties of AMT's Three-Way Handshake. Masters thesis, Concordia University.
work_keys_str_mv AT salemalimohamad formalvalidationofsecuritypropertiesofamtsthreewayhandshake
_version_ 1716607092008157184