Verification of Content-Centric Networking Using Proof Assistant

被引:0
作者
Moriguchi, Sosuke [1 ]
Morishima, Takashi [1 ,2 ]
Goto, Mizuki [1 ,3 ]
Takahashi, Kazuko [1 ]
机构
[1] Kwansei Gakuin Univ, Sanda 6691337, Japan
[2] Suntory Syst Technol Ltd, Osaka, Japan
[3] JFE Adv Co Ltd, Tokyo, Japan
关键词
Content-Centric Networking; proof assistant; network topology; protocol verification;
D O I
10.1587/transcom.2016NEP0013
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we give a formalization of the behavior of the Content-Centric Networking (CCN) protocol with parameterizing content managements. CCN is a communications architecture that is based on the names of contents, rather than on addresses. In the protocol used in CCN, each node sends packets to the nodes that are connected to it, which communicate with further nodes that are connected to them. This kind of behaviors prevents formalizing the CCN protocol as end-to-end communications. In our previous work, we formalized the CCN protocol using the proof assistant Coq. However, in this model, each node in the network can store any number of contents. The storage for each node is usually limited and the node may drop some of the contents due to its filled storage. The model proposed in this paper permits a node to have its own content management method, and still keeps the temporal properties that are also valid in the previous model. To demonstrate difference between these models, we give a specification that is valid in the previous model but invalid in the proposed model, called orthogonality. Since it is generally invalid in CCN, the proposed model is more precise than the previous one.
引用
收藏
页码:2297 / 2304
页数:8
相关论文
共 12 条
[1]  
[Anonymous], 2009, P 5 INT C EM NETW EX, DOI [DOI 10.1145/1658939.1658941, 10.1145/1658939.1658941]
[2]  
Bharadwaj R., 1995, Algorithms, Concurrency and Knowledge. 1995 Asian Computing Science Conference ACSC'95. Proceedings, P335
[3]   Formal verification of standards for distance vector routing protocols [J].
Bhargavan, K ;
Obradovic, D ;
Gunter, CA .
JOURNAL OF THE ACM, 2002, 49 (04) :538-576
[4]  
Carofiglio G, 2012, IEEE CONF COMPUT, P304, DOI 10.1109/INFCOMW.2012.6193510
[5]  
Clarke EM, 1999, MODEL CHECKING, P1
[6]  
Felty AP, 1998, LECT NOTES COMPUT SC, V1427, P428, DOI 10.1007/BFb0028764
[7]  
Goergen David., 2013, Data Privacy Management and Autonomous Spontaneous Security, P274
[8]   An axiomatic basis for communication [J].
Karsten, Martin ;
Keshav, S. ;
Prasad, Sanjiva ;
Beg, Mirza .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) :217-228
[9]  
Killian C., 2007, Proceedings of the 4th USENIX conference on Networked systems design and implementation, NSDI'07, (Berkeley, CA, USA), P18
[10]   Formalization of the Behavior of Content-Centri Networking [J].
Moriguchi, Sosuke ;
Morishima, Takashi ;
Goto, Mizuki ;
Takahashi, Kazuko .
10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS, 2015, 56 :197-204