Modeling & verification of sliding window protocol with data loss and intruder detection using NuSMV

Aditya Sinha, Ajay Ry, Sanjay Singh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Sliding Window Protocol (SWP) is a feature of packet-based data transmission protocol. SWP is used where reliable in- order delivery of packets are required, such as in the Data Link Layer (OSI model) as well as in the Transmission Control Protocol (TCP). To check the proper working and the ow of the protocol, its modeling is very essential. Intruder detection in sliding window protocol is crucial for the the detection of the attacks. Existing model of the sliding window protocol does not include the intruder at the sender's and receiver's end. In this paper we have modeled the role of an intruder at the sender's as well as the receiver's end along with the modeling of the sliding window protocol. We have used NuSMV as a model checking tool to model the Sliding Window Protocol along with Intruder. Intruder detection and property verification of the protocol is done through respective Computational Tree Logic (CTL) formulas on the model. From the model checking it has been shown that the model satisfies all the specification of the sliding win dow protocol. Also it detects the presence of an intruder in the system.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012
Pages352-357
Number of pages6
DOIs
Publication statusPublished - 12-12-2012
Event2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012 - Coimbatore, India
Duration: 26-10-201228-10-2012

Conference

Conference2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012
Country/TerritoryIndia
CityCoimbatore
Period26-10-1228-10-12

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Modeling & verification of sliding window protocol with data loss and intruder detection using NuSMV'. Together they form a unique fingerprint.

Cite this