Verification of RabbitMQ with Kerberos Using Timed Automata

被引:0
作者
Ran Li
Jiaqi Yin
Huibiao Zhu
Phan Cong Vinh
机构
[1] East China Normal University,Shanghai Key Laboratory of Trustworthy Computing
[2] Nguyen Tat Thanh University,undefined
来源
Mobile Networks and Applications | 2022年 / 27卷
关键词
Modeling; Verification; UPPAAL; RabbitMQ; AMQP; Kerberos;
D O I
暂无
中图分类号
学科分类号
摘要
RabbitMQ, an implementation of Advanced Message Queuing Protocol (AMQP), is a very popular message middleware. It supports concurrency, guarantees sequential consistency, and enables independent applications and services to communicate. Consequently, it is of great significance to ensure the secure communication of RabbitMQ. Therefore, Kerberos, a network authentication protocol, is introduced to combine with RabbitMQ to address this security issue. In this paper, we apply formal methods to model and verify RabbitMQ with Kerberos. By utilizing UPPAAL, RabbitMQ is abstracted to timed automata. Further, we validate the constructed model with the simulator in UPPAAL. On this basis, we verify whether RabbitMQ meets some basic but essential properties, including Reachability of Data, Concurrency, Sequence Consistency and Heartbeat Mechanism. Additionally, the security property Secure Communication is verified as well. From the verification results via UPPAAL, it can be found that RabbitMQ can totally cater for these properties and it maintains secure communication under the umbrella of Kerberos.
引用
收藏
页码:2049 / 2067
页数:18
相关论文
共 25 条
[1]  
Kinoshita M(2017)High throughput dequeuing technique in distributed message queues for IoT J Inf Process 25 199-208
[2]  
Konoura H(1994)Kerberos: an authentication service for computer networks IEEE Commun Mag 32 33-38
[3]  
Koike T(2018)A flexible distributed simulation environment for Cyber-Physical Systems using ZeroMQ J Commun 13 333-337
[4]  
Leibnitz K(2021)Towards achieving personal privacy protection and data security on integrated E-Voting model of blockchain and message queue Secur Commun Networks 2021 8338,616:1-8338,616:14
[5]  
Murata M(2021)Verification of the MQTT IoT protocol using property-specific CTL sweep-line algorithms Trans Petri Nets Other Model Concurr 15 165-183
[6]  
Neuman BC(2019)Formal modelling and incremental verification of the MQTT IoT protocol Trans Petri Nets Other Model Concurr 14 126-145
[7]  
Ts’o TY(2020)Modelling and verification of real-time publish and subscribe protocol using UPPAAL and simulink/stateflow J Comput Sci Technol 35 1324-1342
[8]  
Ofenloch A(2018)Securing offline delivery services by using Kerberos authentication IEEE Access 6 40,735-40,746
[9]  
Greif F(undefined)undefined undefined undefined undefined-undefined
[10]  
Chaisawat S(undefined)undefined undefined undefined undefined-undefined