Formal Validation of Security Properties of AMT's Three-Way Handshake
Multicasting is a technique for transmitting the same information to multiple receivers over IP networks. It is often deployed on streaming media applications over the Internet and private networks. The biggest problem multicast introduces today is that it is an all or nothing solution. Every eleme...
Main Author: | |
---|---|
Format: | Others |
Published: |
2011
|
Online Access: | http://spectrum.library.concordia.ca/7324/1/Salem_MSc_S2011.pdf Salem, Ali Mohamad <http://spectrum.library.concordia.ca/view/creators/Salem=3AAli_Mohamad=3A=3A.html> (2011) Formal Validation of Security Properties of AMT's Three-Way Handshake. Masters thesis, Concordia University. |
id |
ndltd-LACETR-oai-collectionscanada.gc.ca-QMG.7324 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-LACETR-oai-collectionscanada.gc.ca-QMG.73242013-10-22T03:44:36Z Formal Validation of Security Properties of AMT's Three-Way Handshake Salem, Ali Mohamad Multicasting is a technique for transmitting the same information to multiple receivers over IP networks. It is often deployed on streaming media applications over the Internet and private networks. The biggest problem multicast introduces today is that it is an all or nothing solution. Every element on the path between the source and the receivers (links, routers, firewalls) requires multicast protocols to be enabled. Furthermore, multicast has a conceptual business model, and therefore is not an easy case to make. These factors, embedded deep in technology, but ultimately shaped by economics, led to a lack of multicast deployment. To address this problem, the AMT (Automatic IP Multicast without explicit Tunnels) specification has been developed by the Network Working Group at the IETF. This specification is designed to provide a mechanism for a migration path to a fully multicast-enabled backbone. It allows multicast to reach unicast-only receivers without the need for any explicit tunnels between the receiver and the source. We have formally validated the three-way handshake in the AMT specification using AVISPA against two main security goals: secrecy and authentication. We have demonstrated that the authentication goal is not met: an attacker can masquerade as an AMT relay, and the AMT gateway (at the end user) cannot distinguish a valid relay from an invalid one. Another attack was also found where an intruder can disconnect or shutdown a valid session for a valid end-user using a replay attack. 2011-04-15 Thesis NonPeerReviewed application/pdf http://spectrum.library.concordia.ca/7324/1/Salem_MSc_S2011.pdf Salem, Ali Mohamad <http://spectrum.library.concordia.ca/view/creators/Salem=3AAli_Mohamad=3A=3A.html> (2011) Formal Validation of Security Properties of AMT's Three-Way Handshake. Masters thesis, Concordia University. http://spectrum.library.concordia.ca/7324/ |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
description |
Multicasting is a technique for transmitting the same information to multiple receivers over IP networks. It is often deployed on streaming media applications over the
Internet and private networks. The biggest problem multicast introduces today is that it is an all or nothing solution. Every element on the path between the source and the receivers (links, routers, firewalls) requires multicast protocols to be enabled. Furthermore, multicast has a conceptual business model, and therefore is not an easy case to make. These factors, embedded deep in technology, but ultimately shaped by economics, led to a lack of multicast deployment. To address this problem, the AMT (Automatic IP Multicast without explicit Tunnels) specification has been
developed by the Network Working Group at the IETF. This specification is designed to provide a mechanism for a migration path to a fully multicast-enabled backbone.
It allows multicast to reach unicast-only receivers without the need for any explicit tunnels between the receiver and the source. We have formally validated the three-way
handshake in the AMT specification using AVISPA against two main security goals: secrecy and authentication. We have demonstrated that the authentication goal is not met: an attacker can masquerade as an AMT relay, and the AMT gateway (at the end user) cannot distinguish a valid relay from an invalid one. Another attack was also found where an intruder can disconnect or shutdown a valid session for a valid end-user using a replay attack. |
author |
Salem, Ali Mohamad |
spellingShingle |
Salem, Ali Mohamad Formal Validation of Security Properties of AMT's Three-Way Handshake |
author_facet |
Salem, Ali Mohamad |
author_sort |
Salem, Ali Mohamad |
title |
Formal Validation of Security Properties of AMT's Three-Way Handshake |
title_short |
Formal Validation of Security Properties of AMT's Three-Way Handshake |
title_full |
Formal Validation of Security Properties of AMT's Three-Way Handshake |
title_fullStr |
Formal Validation of Security Properties of AMT's Three-Way Handshake |
title_full_unstemmed |
Formal Validation of Security Properties of AMT's Three-Way Handshake |
title_sort |
formal validation of security properties of amt's three-way handshake |
publishDate |
2011 |
url |
http://spectrum.library.concordia.ca/7324/1/Salem_MSc_S2011.pdf Salem, Ali Mohamad <http://spectrum.library.concordia.ca/view/creators/Salem=3AAli_Mohamad=3A=3A.html> (2011) Formal Validation of Security Properties of AMT's Three-Way Handshake. Masters thesis, Concordia University. |
work_keys_str_mv |
AT salemalimohamad formalvalidationofsecuritypropertiesofamtsthreewayhandshake |
_version_ |
1716607092008157184 |