skip to main content
10.1145/2393216.2393276acmotherconferencesArticle/Chapter ViewAbstractPublication PagesccseitConference Proceedingsconference-collections
research-article

Modeling & verification of Sliding Window Protocol with data loss and intruder detection using NuSMV

Published:26 October 2012Publication History

ABSTRACT

Sliding Window Protocol (SWP) is a feature of packet-based data transmission protocol. SWP is used where reliable in-order delivery of packets are required, such as in the Data Link Layer (OSI model) as well as in the Transmission Control Protocol (TCP). To check the proper working and the flow of the protocol, its modeling is very essential. Intruder detection in sliding window protocol is crucial for the the detection of the attacks. Existing model of the sliding window protocol does not include the intruder at the sender's and receiver's end. In this paper we have modeled the role of an intruder at the sender's as well as the receiver's end along with the modeling of the sliding window protocol. We have used NuSMV as a model checking tool to model the Sliding Window Protocol along with Intruder. Intruder detection and property verification of the protocol is done through respective Computational Tree Logic (CTL) formulas on the model. From the model checking it has been shown that the model satisfies all the specification of the sliding window protocol. Also it detects the presence of an intruder in the system.

References

  1. Andrew S. Tanenbaum. Computer Networks. Prentice Hall, New Delhi,India, 4 edition, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Yefei Zhao, Zongyuan Yang, Jinkui Xie, and Qiang Liu. Formal model and analysis of sliding window protocol based on nusmv. JCP, 4(6):519--526, 2009.Google ScholarGoogle Scholar
  3. Michael Huth and Mark Dermot Ryan. Logic in Computer Science - Modeling and Reasoning about Systems. Cambridge University Press, New York, NY, USA, 2 edition, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Cimatti, E. M. Clarke, F. Giunchiglia, and M. Roveri. NuSMV: a new Symbolic Model Verifier. In N. Halbwachs and D. Peled, editors, Proceedings Eleventh Conference on Computer-Aided Verification (CAV'99), number 1633 in Lecture Notes in Computer Science, pages 495--499, Trento, Italy, July 1999. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. FBK-IRST. Nusmv. {Available Online} http://nusmv.fbk.eu/NuSMV/index.html, 2012.Google ScholarGoogle Scholar
  6. Roberto Cavada, Alessandro Cimatti, Charles Arthur Jochim, Gavin Keighren, Emanuele Olivetti, Marco Pistore, Marco Roveri, and Andrei Tchaltsev. Nusmv 2.5 user manual. {Available Online} http://nusmv.fbk.eu/NuSMV/userman/index-v2.html, 2010.Google ScholarGoogle Scholar
  1. Modeling & verification of Sliding Window Protocol with data loss and intruder detection using NuSMV

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
        October 2012
        800 pages
        ISBN:9781450313100
        DOI:10.1145/2393216

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 October 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader