Formal Modeling and Analysis of an IETF Multicast Protocol

This paper describes the application of Real-Time Maude to the formal modeling, simulation, and model checking analysis of the NORM multicast protocol standard being developed by the Internet Engineering Task Force. Because of its size and sophistication, real-time features, and the need to model and analyze subcomponents of NORM both in isolation and in combination, NORM poses a set of challenging problems for its formal specification and analysis. Our formal modeling and analysis efforts made us aware of ambiguities, inconsistencies, and cases of under-specification in the informal specification of NORM. Our work indicates that formal methods can successfully be applied by non-experts during the development of advanced Internet protocol standards.

[1]  Mark Handley,et al.  Multicast Negative-Acknowledgment (NACK) Building Blocks , 2008, RFC.

[2]  Mark Handley,et al.  Multicast Negative-Acknowledgment (NACK) Building Blocks draft-ietf-rmt-bb-norm-revised-03 , 2008 .

[3]  Catherine A. Meadows,et al.  Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer , 2004, J. Comput. Secur..

[4]  ÖlveczkyPeter Csaba,et al.  Semantics and pragmatics of Real-Time Maude , 2007 .

[5]  Peter Csaba Ölveczky,et al.  Specification and analysis of the AER/NCA active network protocol suite in Real-Time Maude , 2006, Formal Methods Syst. Des..

[6]  Jonathan Billington,et al.  Formal Analysis of the Internet Open Trading Protocol , 2004, FORTE Workshops.

[7]  Donald E. Knuth,et al.  The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .

[8]  Peter Csaba Ölveczky,et al.  Formal modeling, performance estimation, and model checking of wireless sensor network algorithms in Real-Time Maude , 2009, Theor. Comput. Sci..

[9]  Donald E. Knuth The Art of Computer Programming 2 / Seminumerical Algorithms , 1971 .

[10]  Mark Handley,et al.  NACK-Oriented Reliable Multicast (NORM) Building Blocks , 2004 .

[11]  Peter Csaba Ölveczky,et al.  Formal Simulation and Analysis of the CASH Scheduling Algorithm in Real-Time Maude , 2006, FASE.

[12]  Carl A. Gunter,et al.  Formal verification of standards for distance vector routing protocols , 2002, JACM.

[13]  Andre Scedrov,et al.  Formal analysis of Kerberos 5 , 2006, Theor. Comput. Sci..

[14]  Elisabeth Lien,et al.  Formal Modelling and Analysis of the NORM Multicast Protocol Using Real-Time Maude , 2004 .