secure error signalling for packet-switched networks - the...

12
International Journal of Network Security, Vol.5, No.3, PP.347–358, Nov. 2007 347 Secure Error Signalling for Packet-Switched Networks - The Future Core Networks System Error Protocol Theodore Stergiou 1 and Dimitrios L. Delivasilis 2 (Corresponding author: Theodore Stergiou) Isecure-e Ltd. Arahovis 44, 12136 Peristeri, Athens, Greece 1 (Email: [email protected]) Department of Information and Communication Systems Engineering, University of the Aegean 2 Karlovasi, Samos, 83200, Greece (Received Dec. 20, 2005; revised and accepted June 20 & July 21, 2006) Abstract In this paper a secure error-signalling scheme for packet- switched network architectures is presented. Current so- lutions are based on the Internet Control Message Pro- tocol to deliver information regarding congestion control. The disadvantages of ICMP are given, regarding its lim- itations and dependence on network protocol structures. We then move into presenting the Future Core Network System, followed by an analysis of the FCNS Error Pro- tocol and its comparison against ICMP. We also present measurements taken to observe the performance of the FCNS in cases where the FCNSEP implementation has been imperative and reveal applicability issues for the FC- NSEP in network protocol systems. Keywords: Network security, secure error-signalling, se- cure communication protocols 1 Introduction Error and control protocol architectures are essential to the operation of a set of communication rules, whereby conditions that could prevent the normal communication flow are identified and signalled for correction. Their im- plementation usually follows the unsuccessful attempts of the system entity and/or process to recover from such a situation, resulting in the necessity of external mech- anisms to support and provide the required functions. Cases include congestion build up and notification of the reachability of a particular network host. Error signalling protocols are widely used in computer and telecommu- nication systems as a means of maintaining the required Quality of Service (QoS) levels for a connection. They provide peers with information regarding the communi- cation well being and recovery from situations that could affect its lifespan. The deployment of such mechanisms can be further supported by the implementation of error correction tech- niques. Methods such as Forward Error Control (FEC) [16] enhance the capabilities of the system in detecting and recovering from erroneous situations. Redundant in- formation is included in the user data messages, providing the receiver with the means of detecting and correcting bit errors in the message pattern. These techniques form the final step of the error control system signalling proce- dures and their use falls outside the scope of the paper, so readers interested in this area can reference the respective bibliography. Error signalling protocols are dependent on the set of communication rules supporting the connection in a given topology. Of most importance is the Internet Protocol (IP) [8] of the TCP/IP suite [20], supporting the Internet Control Message Protocol (ICMP) [7]. The following sec- tion presents the architectural view of ICMP providing an analysis of the protocol functionality and applicability. The paper is consequently organized in the following sections. Section 3 presents the motivation for this work, based on the disadvantages and implementation pitfalls of the already proposed and under use solutions. Section 4 depicts the FCNS Error Protocol where a thorough analysis is given regarding its architecture and the interlayer and peer error-signalling procedures. We then move into identifying the security considerations of our proposal (Section 5) followed by the evaluation environments and measurements obtained to test its performance (Section 6). Finally, Section 7 consists of conclusions of the research work presented, together with directions for future work on the specific research area.

Upload: others

Post on 14-Jul-2021

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Secure Error Signalling for Packet-Switched Networks - The ...ijns.jalaxy.com.tw/contents/ijns-v5-n3/ijns-2007-v5-n3-p...the TCP/IP stack, ICMP currently forms the only er-ror signalling

International Journal of Network Security, Vol.5, No.3, PP.347–358, Nov. 2007 347

Secure Error Signalling for Packet-SwitchedNetworks - The Future Core Networks System

Error Protocol

Theodore Stergiou1 and Dimitrios L. Delivasilis2

(Corresponding author: Theodore Stergiou)

Isecure-e Ltd. Arahovis 44, 12136 Peristeri, Athens, Greece1

(Email: [email protected])

Department of Information and Communication Systems Engineering, University of the Aegean2

Karlovasi, Samos, 83200, Greece

(Received Dec. 20, 2005; revised and accepted June 20 & July 21, 2006)

Abstract

In this paper a secure error-signalling scheme for packet-switched network architectures is presented. Current so-lutions are based on the Internet Control Message Pro-tocol to deliver information regarding congestion control.The disadvantages of ICMP are given, regarding its lim-itations and dependence on network protocol structures.We then move into presenting the Future Core NetworkSystem, followed by an analysis of the FCNS Error Pro-tocol and its comparison against ICMP. We also presentmeasurements taken to observe the performance of theFCNS in cases where the FCNSEP implementation hasbeen imperative and reveal applicability issues for the FC-NSEP in network protocol systems.

Keywords: Network security, secure error-signalling, se-cure communication protocols

1 Introduction

Error and control protocol architectures are essential tothe operation of a set of communication rules, wherebyconditions that could prevent the normal communicationflow are identified and signalled for correction. Their im-plementation usually follows the unsuccessful attempts ofthe system entity and/or process to recover from sucha situation, resulting in the necessity of external mech-anisms to support and provide the required functions.Cases include congestion build up and notification of thereachability of a particular network host. Error signallingprotocols are widely used in computer and telecommu-nication systems as a means of maintaining the requiredQuality of Service (QoS) levels for a connection. Theyprovide peers with information regarding the communi-cation well being and recovery from situations that couldaffect its lifespan.

The deployment of such mechanisms can be furthersupported by the implementation of error correction tech-niques. Methods such as Forward Error Control (FEC)[16] enhance the capabilities of the system in detectingand recovering from erroneous situations. Redundant in-formation is included in the user data messages, providingthe receiver with the means of detecting and correctingbit errors in the message pattern. These techniques formthe final step of the error control system signalling proce-dures and their use falls outside the scope of the paper, soreaders interested in this area can reference the respectivebibliography.

Error signalling protocols are dependent on the set ofcommunication rules supporting the connection in a giventopology. Of most importance is the Internet Protocol(IP) [8] of the TCP/IP suite [20], supporting the InternetControl Message Protocol (ICMP) [7]. The following sec-tion presents the architectural view of ICMP providing ananalysis of the protocol functionality and applicability.

The paper is consequently organized in the followingsections. Section 3 presents the motivation for thiswork, based on the disadvantages and implementationpitfalls of the already proposed and under use solutions.Section 4 depicts the FCNS Error Protocol where athorough analysis is given regarding its architecture andthe interlayer and peer error-signalling procedures. Wethen move into identifying the security considerationsof our proposal (Section 5) followed by the evaluationenvironments and measurements obtained to test itsperformance (Section 6). Finally, Section 7 consists ofconclusions of the research work presented, together withdirections for future work on the specific research area.

Page 2: Secure Error Signalling for Packet-Switched Networks - The ...ijns.jalaxy.com.tw/contents/ijns-v5-n3/ijns-2007-v5-n3-p...the TCP/IP stack, ICMP currently forms the only er-ror signalling

International Journal of Network Security, Vol.5, No.3, PP.347–358, Nov. 2007 348

Figure 1: ICMP message header structure

2 IP Error Signalling Protocols

(ICMP) [7]

ICMP is one of the most commonly used error signallingmechanisms, designed to support the notification of peerentities of conditions that might affect their communica-tion. Its header message structure is depicted in Figure 1,together with the notification options supported. De-pending on the fault situation, the PARAMETERS fieldis updated accordingly, including an amount of the datasent when the problem has been detected, to enable themessage recipient to identify the location of the fault con-dition in the data stream and the upper layer(s) involvedin the situation.

ICMP can be used either as an error signalling or in-formational protocol. In the former case, the nodes com-municate information regarding situations that may inter-rupt or disrupt the communication process. In the lattercase, the echo messages are used to obtain informationregarding the status of the system. Their difference isidentifiable by the type field of the ICMP header, whichwill have the high order bit set to ‘0’ for the error com-munication procedures and to ‘1’ when the message actsas an informational element.

ICMP is used in the TCP/IP protocol stack as the ar-chitecture responsible for ensuring that the data messagesconform to the parameters set during the connection es-tablishment phase, and also that their routing towardsthe intended destination is successful. The protocol isnot responsible for end-to-end connectivity issues, usu-ally handled by the TCP flow control mechanisms, andhence can provide notification for only a limited numberof error conditions.

Consequently, the responsibilities of ICMP are some-what limited with respect to congestion handling, eitheras a congestion recovery or congestion avoidance mecha-nism. In the first case the purpose of its initiation is theprevention of a zero throughput network appearance. Thesecond case involves issues of congestion recovery evenwhen such measures have already been enforced on theparticular connection. A typical method realising the con-gestion monitoring and maintenance services is the sourcequench process, whereby the source is instructed to reducethe rate at which information is forwarded onto the net-work topology. Unfortunately, ICMP does not inform the

end system of the actual reason for which the request hasbeen launched, and hence the indication may not alwaysbe specific to the particular system, in the sense that itmay not imply that the signalled system is the cause ofcongestion.

ICMP also provides a measure for informing the datasource of any inconsistencies in the network topology thatmay deny the transmission of its messages towards thereceiver. The destination unreachable message includesinformation as to whether a route to the peer actually ex-ists and/or details about the legitimacy and capabilitiesof the node directly connected to the sending instance.Further notification procedures include the signalling ofconditions related to excessive packet sizes, timer expira-tions and parameter problems of the IP implementation.These techniques attempt to provide the means of regulat-ing the data flow in relation to the QoS levels negotiatedfor the connection on a link basis.

Since most of the network architectures are based onthe TCP/IP stack, ICMP currently forms the only er-ror signalling procedure available. Despite this fact, wehave identified several disadvantages of the ICMP family,forming the motivation behind our work.

3 Motivation for the Work

The drawbacks recognized for the ICMP architecture fallinto several categories, entailing performance and securityissues.

The ICMP protocol forms an integral part of IP, result-ing in its use being prohibited in architectures based onanother protocol stack. ICMP is used as a peer error sig-nalling technique, meaning that notification is only avail-able for the communicating parties. Signalling of faultconditions to the protocol stack layers is left to mech-anisms implicit in the network architecture supportingthe connection. However, the dependence of these mea-sures on the implementation of the TCP/IP stack meansthat different networks may exhibit independent mea-sures. Vendor-specific hardware possesses distinct fea-tures reducing compatibility with other topologies, im-plying the modification of the ICMP implementation de-pending on the network operator and system running IP.

Until the design of the IP security architecture (IPsec)[14], all ICMP messages were sent in cleartext format,

Page 3: Secure Error Signalling for Packet-Switched Networks - The ...ijns.jalaxy.com.tw/contents/ijns-v5-n3/ijns-2007-v5-n3-p...the TCP/IP stack, ICMP currently forms the only er-ror signalling

International Journal of Network Security, Vol.5, No.3, PP.347–358, Nov. 2007 349

leaving the network susceptible to various attacks byunauthorised parties [3]. Although IPsec provides for theprotection of the protocol’s messages against modificationand Denial of Service (DoS) attacks, the functions of thearchitecture closely bind any security considerations tothe IPsec structure for which security is not always im-perative. This implies that ICMP messages could stillbe sent unencrypted, if an association was to be initiatedwithout any protection mechanisms enabled. The provi-sion of the IPsec services for the ICMP messages shouldaccount for the adequate protection of the protocol dataagainst unauthorised modification and information disclo-sure attacks. This notion does not imply any protectionof the system against attacks aiming at the IPsec architec-ture itself [4, 5, 9, 10, 11, 15, 18, 19, 25], or by exploitingvulnerabilities of the system running the IPv6 protocol[6, 17, 21].

For the ICMPv6, a number of additional vulnerabili-ties have been identified, with respect to attacks launchedby manipulating the protocol error messages [13]. Of im-portance are the forcing of the communication to a lesssecure mode and the routing of data through illicit net-works. In the first case, the attacker manipulates a desti-nation unreachable message received in response to a keymanagement protocol request, forcing the source to fallback to a scheme or operational mode that is less securethan that requested. In the second attack category, theICMP redirect message is used to force the routing of theuser data via a network where the adversary possessesdirect access privileges. Finally, implementations of theMicrosoft Windows operating systems family are suscep-tible to ICMPv6 flooding attacks, due to the inability ofthe connection firewalls to block IPv6 traffic [12].

The most significant disadvantage of the ICMPv6 im-plementation is however that authentication and encryp-tion are recommended actions. Message integrity andconfidentiality should form an implementation prerequi-site to ensure the safe passage of the error signalling mes-sages especially for unknown or suspicious networks. Yet,the scheme is left at the discretion of network operators,who may choose to send the messages unprotected to min-imize the amount of network resources and processing itwould take to authenticate and verify their validity.

The vulnerabilities of the IP error control signallingprotocol and its dependence to specific network architec-tures have led to the development of the FCNS ErrorProtocol (FCNSEP), implemented for the FCNS referencearchitecture [22, 23, 24]. To our knowledge, the provisionof error signalling structures for secure reference archi-tectures has not been accounted for standardised models,such as the OSI security architecture [1] or the TCP/IP[20]. In particular, the support of an interlayer-signallingscheme independent of the individual layered protocolmechanisms is a notion previous research has not dealtwith.

Figure 2: FCNS architecture in relation to the OSI 7-layermodel

4 FCNS Error Protocol (FC-NSEP)

The FCNSEP has been designed as the means of pro-viding a secure error signalling solution for architecturesbased on the FCNS protocol stack model. In the followingsections a brief overview of the FCNS is given, followedby an analysis of the FCNSEP operation.

4.1 FCNS Architecture

FCNS is a secure reference architecture for packet-switched environments, where emphasis has been givento the protection of both the internal and external mes-sages of the stack. Its conceptual view is given in Figure 2with respect to the OSI 7-layer model, whereas Figure 3provides information as to the communication betweentwo network peers. Specific details on the FCNS securitymechanisms and functions can be found in [22, 23, 24] andwill consequently not be analysed in this paper.

The Security Layer (SL) initiates the functions that en-crypt/decrypt a message, verify its validity, secure a com-munication channel both on an end-to-end and link basisand protect the FCNS error protocol. Furthermore, itgoverns the functions that setup and maintain the FCNSkeystream generator, which provides the secret keys usedfor the inter-layer messages [22, 23]. Security mechanisms,such as authentication, integrity, confidentiality and non-repudiation are applied to each one of the layers indepen-dently, whenever those are requested by the respectiveprotocol.

Management and monitoring of the protection mecha-nisms on a single layer such as the SL, enhances flexibilityand portability issues, whereby possible updates of the se-curity mechanisms would not affect the operation of theFCNS layers.

The secret keys and algorithms used for the protection

Page 4: Secure Error Signalling for Packet-Switched Networks - The ...ijns.jalaxy.com.tw/contents/ijns-v5-n3/ijns-2007-v5-n3-p...the TCP/IP stack, ICMP currently forms the only er-ror signalling

International Journal of Network Security, Vol.5, No.3, PP.347–358, Nov. 2007 350

Figure 3: FCNS peer-entity communication

of the FCNS inter-layer messages and those intended forthe user data are exchanged prior to the connection estab-lishment phase, in the form of security contexts indepen-dent for each layer of the architecture. By this method itis ensured that a compromise at a given layer of the com-munication would not jeopardize the operability of rest ofthe architecture, providing at the same time a degree ofmeasure in identifying and explicitly locate implementa-tion pitfalls for recovery purposes.

The User-Defined layer is responsible for the semanticsand the session establishment of the connection. In par-ticular, the User-Defined Presentation layer (UDPRES) isinvolved with the message encoding procedures ensuringthe secure negotiation of the transfer syntax for a partic-ular connection. Additionally, the User-Defined Sessionlayer (UDSES) has the task of synchronizing a sessionand enforce the address verification procedures, which cansupport the FCNS authentication procedures.

The Transmission layer (TX LAYER) enforces the nec-essary handshake mechanisms and reliably transfers thedata between the ultimate end-nodes. The End-to-endlayer (EE LAYER) is responsible for the routing of theFCNS packets between various subnetworks, error detec-tion and correction techniques, as well as for enforcingthe link-based security features of the FCNS. Finally, thePhysical layer (PHYS) resembles the interface betweenthe FCNS and the physical medium protocols, support-ing the operation of traffic padding mechanisms counter-ing traffic analysis attacks.

FCNS is designed to account for vulnerabilities and im-plementation pitfalls of the OSI security model and theTCP/IP protocol suite. The major points behind its de-velopment are the protection of the messages that areinternal to the stack and the placement of the respectivefunctionality into a single layer. The specification of theSL ensures the simplicity of the architecture and the pro-vision of a simple managed solution for network protocoltopologies. The removal of the redundant functions from

the communication layers enables the implicit error allo-cation, and the increase of the FCNS flexibility in updatesreflecting cryptographic advances.

The FCNS communication layers account for the com-munication establishment, maintenance and release, in afashion similar to the OSI 7-layer model. The lack of dis-tinctive Application and Physical layer OSI-type proto-cols in our work follows from the fact that their simulationwould not have provided any valuable information as tothe security of the service primitives exchanged. Conse-quently, details specific to the conversion of the bit streaminto electrical and/or digital signals, as well as the speci-fication of implicit applications were outside the scope ofthe work.

4.2 FCNSEP Operation

The FCNSEP has therefore been developed to supportthe signalling of a wide range of erroneous conditions,in relation to the stack operation and the communica-tion between peer nodes. It forms part of the overallFCNS stack architecture and is initiated by the commu-nication instances whenever a fault condition arises, toenable its correction and the continuation of the connec-tion. It can also be used as a stand-alone error signallingand control system in packet-switched network architec-tures, provided that its messages are secured prior to theirtransmission via the communications channel.

Its operation is based on three main modes, defined asInterlayer error signalling, Peer error signalling and Sys-tem signalling for unrecoverable and unidentified errors.These functions form the very essence of the FCNSEP andare used throughout the various phases of the communi-cation of the FCNS. No matter the approach, FCNSEPis always initiated via the SL upon reception of the errornotification by either an FCNS layered protocol or thecommunicating peer, as shown in Figure 4.

The NODE ALERT message signals the error condi-

Page 5: Secure Error Signalling for Packet-Switched Networks - The ...ijns.jalaxy.com.tw/contents/ijns-v5-n3/ijns-2007-v5-n3-p...the TCP/IP stack, ICMP currently forms the only er-ror signalling

International Journal of Network Security, Vol.5, No.3, PP.347–358, Nov. 2007 351

tion to the SL, which should reply by providing the ap-propriate action required for the recovery and correctionof the fault situation. If such an action cannot be offered,then the FCNSEP is used to advise the system of the cir-cumstance and inform the protocol instances of the stepsto be taken. On the other hand, if the necessary mecha-nisms can be made available, then FCNSEP is realised toprovide the FCNS communication layers and/or the peernodes with the respective indication.

Figure 4: FCNSEP realisation in the FCNS architecture

The ERROR REP and ERROR RESP messages de-picted in Figures 5 and 6 respectively, form part of theexchange procedure of Figure 4 and are responsible forthe transmission of the information representing the er-ror condition and the action suggested for its recovery.

Figure 5: FCNSEP ERROR REP message

Figure 6: FCNSEP ERROR RESP message

For the ERROR REP message, the following fields con-tain the necessary signalling information for the fault con-

dition:

• ERROR PARAMS field, which includes parameterssuch as the sending node and intended destinationof the FCNSEP message (NEoA and NEdA fields),as well as information about the user and the con-nection on which the error has been identified. Ifthe destination is not directly adjacent to the trans-mitted instance, then the message should be mappedonto an FCNS packet and be encrypted with link-based mechanisms, to ensure its secured traversingvia the intermediate nodes. The USER INFO andCONN ID fields include details on the QoS parame-ters that should be used to identify the priority theSL should give the message upon its reception, aswell as on the network connection upon which com-munication is based. The latter field is essential inpacket-switched topologies where various messagesflow due to numerous simultaneous connections. Bythis method, the end-systems will identify the appro-priate ERROR REP message forwarding or discard-ing those intended for other elements.

• ERROR REPORT field, which is used to indicate thecondition that triggered the FCNSEP message.

Additionally, for the FCNSEP ERROR RESP message,the fields containing parameters as to the action that thepeer or layer should follow for the error correction are asfollows:

• ERROR RESP or ERROR RESPONSE field that in-cludes information about the network element or peerfor which the action has been suggested (the NEIfield), as well as the ACTION REC field containingthat particular action.

• ERROR REPORT field, which is similar to the re-spective one of the ERROR REP message and whoseinclusion denotes the error for which the FCNSEPmessages have been sent. Failure to include such datain the message results in the discarding of the respec-tive response and the indication of the error to thepeer entity or the SL protocol.

The following sections provide information regardingthe three FCNSEP operational modes, in relation to theprocedure depicted in Figure 4. Prerequisites and re-quirements for ensuring the protocol functionality are alsogiven, pending the security of the FCNSEP messages.

4.2.1 FCNSEP Interlayer Error Signalling

The FCNSEP implementation is subject to the recep-tion of a message in error more than three consecutivetimes, or the failure to establish certain connection pa-rameters after an equal amount of attempts. This featureis used to minimise the possibility that FCNSEP functionscome into effect for situations where error recovery maybe achieved at no extra cost by other FCNS mechanisms.

Page 6: Secure Error Signalling for Packet-Switched Networks - The ...ijns.jalaxy.com.tw/contents/ijns-v5-n3/ijns-2007-v5-n3-p...the TCP/IP stack, ICMP currently forms the only er-ror signalling

International Journal of Network Security, Vol.5, No.3, PP.347–358, Nov. 2007 352

The FCNSEP is implemented only if this is regarded asan absolute necessity by the system or the node process,to enable the suitable use of the available link resourcesfor the data transfer phase only.

When error signalling takes place, the protocol detect-ing the error informs the SL of the fault condition, toprovide the suggested for recovery action. If the SL pro-tocol can offer the required action supporting the errorcorrection and recovery procedure, then this is indicatedto the layer via the ERROR RESP message, includingthe reason for which the message has been sent to distin-guish between any other NODE ALERT requests made.Depending on the severity of the error, the SL protocoldecides upon the action to be taken, including the re-lease of the connection in cases the layer cannot recoverfrom the error condition (FATAL situation). At the sametime, it also decides whether the user of the layer protocolshould be notified of the condition or even the signallingof the situation to the peer.

If the suggested action can be supported then the nec-essary functions are enforced to correct the error that hasoccurred and to proceed in supporting the particular con-nection. If this is not possible, then the NODE ALERTmessage is sent again, indicating the protocol’s inabilityto conform to the SL dictations. The node should keep arecord of the number of error indications sent to the SLand if that number exceeds the predetermined thresholdfor the particular protocol (usually three tries), then theconnection is released and the system is notified of thesituation following the signalling of the condition to thepeer.

Finally, it may be the case that the SL is unable to pro-vide details about the correction and recovery from thefault condition. In such situations, the NODE ALERTmessage is replied with a NAK message, signalling the no-tification of the system of the condition that has arisen.Care is taken in dismissing any error indication by the lay-ers for fear of an active attack by an adversary, wherebythe attacker is inserting illicit error requests messagesto disrupt the connection service or obtain informationabout the operation of the SL protocol. It is thereforeimperative that all FCNSEP related messages are securedusing the parameters exchanged via the Security Contexts(SC) during the connection establishment phase.

4.2.2 FCNSEP Peer Error Signalling

FCNSEP peer error signalling is a process initiated uponindication from the SL protocol that the peer should benotified of the error condition. The indication is includedin the ACTION REC field of the ERROR RESP mes-sage, as well as providing the appropriate NEI identifierin the respective field. The process involves the transmis-sion of the ERROR REP message towards the peer entityinvolved in the error condition. The message can be ini-tiated by either the data messages intended destinationor an intermediate router responsible for the forwardingof the messages to their recipient. Typical examples in-

clude the indication of an ARQ or Transmission layer flowcontrol failure, the notification of an unreachable host,breach of the QoS connection levels or the detection of acongested and/or faulty transmission link.

If the layer entity can, in conjunction with the SL pro-tocol, identify and correct the error then an acknowledg-ment is sent back to the peer to indicate that communi-cation can proceed. Any suggested actions related to thereceiving instance are mapped onto the data messages,reducing the overhead that would be produced by a fur-ther ERROR RESP message transmission. In contrast, iffurther negotiation of the necessary parameters needs totake place, then this is signalled via the ERROR RESPmessage to the appropriate node or the system.

Upon reception of the ERROR REP response, thenode enters a final checking routine phase, wherein thelayer attempts to overcome the problem with the actionproposed by the SL. If the fault cannot be corrected, thenthe node initiates the connection release phase. The SLnotifies the system of the condition that led to the termi-nation of the association, so that appropriate actions canbe found and uploaded to the node instances accordingly.

4.2.3 FCNSEP System Error Signalling

System error signalling procedures involve the explicit no-tification of the system network elements in cases whereerror recovery services cannot be offered to a particularFCNS instance. It usually follows the unsuccessful at-tempts of the SL protocol to negotiate with the FCNScommunication layer and/or the peer entity the appropri-ate mechanisms that can be used for the error correctionphase of a particular connection.

The error notification procedure is initiated by the SLprotocol instance in the form of the ERROR REP mes-sage, where an indication of the fault condition is given,together with identification of the particular instance thatexperienced the situation. If the network operator canprovide the necessary functions for the error correctionand recovery procedures, then these are included in theERROR RESP message sent back to the SL. If not, thesystem informs the SL protocol that it is initiating theconnection release process. An entry of the conditioncaused the termination of the association is kept in a file,to enable the monitoring of the situation and the develop-ment of an adequate function that could be used if suchconditions ever arise.

The principles governing the detection and signallingof error conditions to the system entity follow those pre-sented for the peer error notification case, since they in-volve the communication of a particular FCNS instancewith an external network element. The only difference ob-served in the two processes concerns the uploading of theinformation obtained to all nodes present on the giventopology, increasing the network elements’ awareness ofany fault conditions that might affect their operation. Incontrast, peer error signalling is a locally based solutionwhere mechanisms are addressed only to the nodes in-

Page 7: Secure Error Signalling for Packet-Switched Networks - The ...ijns.jalaxy.com.tw/contents/ijns-v5-n3/ijns-2007-v5-n3-p...the TCP/IP stack, ICMP currently forms the only er-ror signalling

International Journal of Network Security, Vol.5, No.3, PP.347–358, Nov. 2007 353

volved in the data transfer communication process. It isalso important that the mechanisms used to secure thesystem signalling messages be independent of those usedfor the interlayer and peer error notification functions toprotect the network against possible active attacks.

The purpose of the FCNSEP is the signalling of errorsituations to peers and the negotiation of the proposedschemes for their correction. The possibilities and faultconditions that may occur in a network vary from soft-ware to hardware faults. FCNSEP implementation doesnot dictate the mandatory correction of and recovery fromsuch situations, though it provides an adequate and se-cured method in responding to system calls regarding themaintenance of the requested connection QoS.

The following section identifies the security consider-ations of the FCNSEP. The information exchanged viaits messages it too vital to be sent in plaintext format,since an attacker could use these to discontinue the com-munication process. Consequently, details are also givenwith respect to possible attacks that could be launchedagainst the system, in the absence of the necessary pro-tection mechanisms. The discussion also includes com-parison with the ICMP to further support our claims forthe superiority of our designed in relation to the ICMParchitecture, given the issues presented in Sections 2 and3.

5 FCNSEP Security Considera-

tions

The SL protocol provides the required security servicesfor the FCNSEP signalling messages. The service of theFCNSEP can be therefore regarded as connectionless, inthe sense that the messages can be transmitted by anFCNS communication layer towards the SL at any time,no matter the connection which the layer might be in-volved at that time. Similarly, a peer entity might besupporting more than one communication processes, yetan FCNSEP request can be launched at any time irrespec-tive of the connection and the phase association resides atthat time. Although the appropriate connection param-eters are included in the FCNSEP messages to facilitatethe identification and correction of the fault condition, theend-to-end connectivity issues are left to the FCNS com-munication layers responsible for the actual transmissionof the error signalling information.

The security contexts agreed during connection estab-lishment, provide for the peer entity authentication, in-tegrity and confidentiality services to be used throughoutthe communication process, securing the data transfer ona connection basis rather than on a message-based foun-dation. Consequently, FCNSEP is secured on a connec-tionless service basis, to enable the protection of the errorsignalling data irrespective of the connection in question,since the peers have already been afforded the requiredservices during association set up. However, for the FC-NSEP peer error signalling process, the network operator

is able to request peer-based security services for the con-nection, given that the appropriate certification authoritycan provide the necessary parameters for the FCNSEPprotection.

One of the first security measures applied for the FC-NSEP messages is the authentication of the data trans-ferred either between the FCNS layers or the peer entities.The mechanisms, other than the secret keys, could be thesame for both cases. The message digest is included in thedata, where an identifier is also contained for protectionagainst possible replay attacks. The identifier must bespecific for a connection or error-signalling request andnever be used for another FCNSEP initiation. For theFCNSEP, the SHA-512 algorithm [2] has been chosen togenerate the necessary message hash, as it currently formone of the most powerful one-way hash functions, sinceSHA-1 has been broken [27].

Message authentication follows the data origin verifi-cation principles of the security functions offered by theSL protocol. The peer entities confirm the validity of onlythe sender of the FCNSEP message, relying on the peer-entity authentication functions to confirm the legitimacyof the nodes themselves. The source and data recipientsverify that the message can indeed traverse the networkand is not the product of an illicit node attempting tomanipulate the connection.

Since the validity of the message can only ensure thelegitimacy of the transmitter, FCNSEP messages are af-forded the appropriate integrity functions to certify thattheir contents have not been tampered with, either byan adversary or a faulty transmission link. Encryptionof the message is mandatory even in the interlayer sig-nalling cases, to counter an active protocol attack. In thisparticular security service, the SL is able to provide thenetwork operator and/or the host with an additional mea-sure against replay attacks. For each FCNSEP messagea timestamp value is calculated, which is then encryptedtogether with the message, given that authentication ser-vices have successfully been applied. By this method, theFCNS further enhances the protection of the end-systemsby minimising the possibilities that any replayed messagescan be accepted as valid ones.

If an attacker were able to alter the information con-tained in the FCNSEP data, then that could cause seriousproblems possibly leading to disconnection. A typical ex-ample of such a case is the repeated manipulation of theERROR REP and ERROR RESP messages, whereby theadversary alters the contents of the ERROR REPORTfield issuing a FATAL error request to the peer entity.If the node accepts the request as being a legitimate one,then that would lead to the termination of the connection.Therefore, a successful DoS attack could be mounted ifthe messages are not sent securely over the communica-tions channel.

Furthermore, since the messages are intended for aparticular destination, the FCNSEP security mechanismscan additionally ensure the confidentiality of the data intransit, together with verifying its integrity. Message

Page 8: Secure Error Signalling for Packet-Switched Networks - The ...ijns.jalaxy.com.tw/contents/ijns-v5-n3/ijns-2007-v5-n3-p...the TCP/IP stack, ICMP currently forms the only er-ror signalling

International Journal of Network Security, Vol.5, No.3, PP.347–358, Nov. 2007 354

integrity functions may be coupled with a public keyscheme, whereby only the legitimate destination is ableto decipher the message.

The application of functions such as non-repudiationand access control is not of importance for the FCNSEParchitecture. The former is rendered redundant by themonitoring and maintenance capabilities FCNS can pro-vide to an already established connection. The latter ismade unnecessary by the assumption in this paper thatall nodes are peers. The security implications of the FC-NSEP architecture form one of the essential elements ofthe protocol and any unsecured messages are discarded.

The importance of the SL and the FCNS security func-tionality can also be validated via the examples givenin Section 2. The protection of the FCNSEP messagesis mandatory in contrast to the ICMP ones, where se-curity is optional. Even when a functional IPsec im-plementation is provided, ICMP security is not set bydefault. This means that vital messages could be sentun-encrypted over an unsecured public network, result-ing in their manipulation by an adversary. For example,the Source Quench messages could repeatedly be sent to-wards a host, essentially minimising its sending rate tozero, forcing a successful Denial of Service (DoS) attack.Similarly, the Destination Unreachable messages, if notvalidated, could cause the denial of transmission towardsa specific network element, and hence cause connectiondiscontinuity.

In contrast, the FCNSEP messages are always authen-ticated and secured prior to their transmission, even in theinterlayer signalling procedure case, avoiding problems as-sociated with the ICMP. Considering the case of the failedlink error situation, if the ERROR REP message was sentin plaintext format, an adversary could gain knowledge ofthe fault condition and force illicit messages in the net-work. That would result in the network element receivingthe message to recalculate the specific route without anylegitimate reason. If the messages were to be continu-ously sent, then the FCNS implementation could entera livelock, whereby the particular implementation wouldalways calculate the specific route, until the operator wasmade aware of the situation. Even worse, the manipu-lation of the ERROR RESP messages could force a hostto follow an alternative route that could match the needsof an attacker, causing a Redirect attack for the dataand/or signalling messages. Given that FCNS has beendesigned to support connectivity in 3G core network sys-tems [22, 23, 24], the attack could imply the discontinuityof a connection for several subscribers.

For the timer recalculation error signalling procedure,successful manipulation of the ERROR REP and ER-ROR RESP messages could cause a DoS attack, giventhat an end-system could be forced to wait indefinitelyfor the acknowledgment messages. In both cases, it isobvious that the support provided by the SL is vital forthe successful operation of the FCNSEP. Given that theapplication of the FCNS security mechanisms does notaffect the operation of the hosts running the stack [24],

then it can be concluded that the FCNSEP provides amore complete solution than the ICMP, both in the areaof error signalling notification capabilities, as well as ofthe system security.

Following the identification of the FCNSEP functional-ity and the motivation behind this proposal, we move intoproviding performance measurements of the error proto-col and its effects on the communication procedure.

6 Evaluation Environments

The evaluation of the FCNSEP operation has taken placeusing the OMNET++ simulator [26], running on a Win-dows 2000 machine, under the Microsoft Visual C++ en-vironment. The FCNS simulation environments are de-picted in Figures 7 and 8. In the former topology, thefunctionality of the FCNSEP running on the interlayererror-signalling mode has been measured. In the lattermodel, the FCNSEP peer error signalling procedures havebeen put under test.

To observe the response of the system by the initia-tion and implementation of the FCNSEP, we have mea-sured the FCNS overall message loss ratio, as well as theFCNS packet throughput response throughout the dura-tion of the simulation runs (in kilobits per simulation timesecond). For both environments, the datarate has beenset to 10 Mbps to emulate the bandwidth offered by atypical Ethernet network, whilst the message and serviceprimitives processing delay has been set to 2 msec. Wehave also applied a 5 msec processing time for a messageto traverse the FCNS architecture and hence reach thePhysical layer pending its transformation onto the FCNSframe. The size of the FCNS packet and frame are 12232bits and 12368 bits respectively, when full security mea-sures are applied. Given the 10Mbps datarate, then theoptimum transmission time for a single frame will be 1.24msec.

For the interlayer error-signalling procedures, the en-vironmental variables correspond to a Round Trip Time(RTT) of 60 msec for the link between the input and out-put FCNS instances (Figure 7). The example erroneouscase, involved an initial 25 msec message timer that hadto be changed to adapt to the network environment of thepropagation delay of 30 msec. We have implemented anARQ Go Back N flow control mechanism, with the Phys-ical layer constructing the FCNS frames as they arrive bythe upper layer, that is, without storing them first into abuffer before creating the message block. The block hasbeen assumed to consist of 32 FCNS frames. All mea-surements have been taken with respect to the Bit ErrorRate (BER) probability, for the constant RTT of 60 msecand FCNS packet and frame sizes.

The effects of the FCNSEP implementation on the sys-tem’s loss ratio are depicted in Figure 9. On a theoreti-cal level, the minimum effect of the FCNSEP realisationwill be as follows. For the receiving instance to adjustits timer, the NODE ALERT message is sent after three

Page 9: Secure Error Signalling for Packet-Switched Networks - The ...ijns.jalaxy.com.tw/contents/ijns-v5-n3/ijns-2007-v5-n3-p...the TCP/IP stack, ICMP currently forms the only er-ror signalling

International Journal of Network Security, Vol.5, No.3, PP.347–358, Nov. 2007 355

Figure 7: FCNS stack OMNET++ simulation environ-ment

Figure 8: FCNS generic packet-switched OMNET++simulation environment

frames have been discarded, or the receiving timer has ex-pired three times. The time it will take for the SL to issuethe appropriate action and the receiver to adjust the newvalue is 8 msec and hence an overall 13 msec for the Phys-ical layer protocol to be notified of the alteration. For theoptimum transmission time of 1.24 msec, this should im-ply a loss of 10 frames, due to rejection by the receivingprotocol instance.

Overall, the discarded messages should have been13 from just the alteration process, plus 7 additionalframes due to the timer expiration at the Physicallayer before its adjustment (32message × 1.24msec =39.68msec, 9.68msec → 7frames), making up for anoverall loss of 20 frames. However, due to the discrete-event nature of the simulator, the loss induced on thesystem has only been 5 frames (3 that were lost beforethe FCNSEP application, 1 after the ERROR RESP re-

Figure 9: FCNS loss ratio - Variable BER, constant datasize and RTT of 60 msec

ception and 1 after the adjustment of the timer). This isdue to the fact that throughout the FCNSEP signallingprocedures, the sender has sent no messages as would havebeen expected in a real-network situation.

These effects reflected upon the FCNS packet through-put response as is depicted in Figure 10. The decreaseobserved is in the range of 5-7 frames, depending on theFCNS instance status and the BER value. As the latteris increased, more frames and FCNSEP messages may bediscarded at the receiver due to unrecoverable bit patternerrors, resulting in the response of Figure 10.

Figure 10: FCNS packet throughput - Variable BER, con-stant data size and RTT of 60 msec

For the peer error-signalling procedures, the model ofFigure 8 has been afforded an overall 260 msec RTT delay,divided as 40 msec transmission delay imposed to the in-put FCNS instance - subnet1 and subnet 2 - output FCNSinstance links, with the remaining 50 msec induced in thesubnet1 - subnet 2 one. All links to and from subnet 3have been assigned a propagation delay of 50 msec, tocompensate for an alternative to the primary (input in-stance to subnet 1 to subnet 2 to output instance) route.

Page 10: Secure Error Signalling for Packet-Switched Networks - The ...ijns.jalaxy.com.tw/contents/ijns-v5-n3/ijns-2007-v5-n3-p...the TCP/IP stack, ICMP currently forms the only er-ror signalling

International Journal of Network Security, Vol.5, No.3, PP.347–358, Nov. 2007 356

The effects of the FCNSEP application are illustratedin Figure 11, where an indication of the loss ratio isgiven in relation to the measurement taken for an error-signalling free transmission. The increase of the numberof lost messages with respect to the response of Figure 9is due to the application of various FCNS functions forthe establishment of the data transfer process. As theBER increases, the probability that any message, includ-ing those of the FCNSEP, is received on error in max-imised, irrespective of the phase communication may re-side. Additionally, if the primary route fails, then thetransmission of the FCNS messages via an alternativepath will result in further losses, due to the path and routeverification procedures that must take place between theEnd-to-End layer and the SL at all network nodes. TheFCNSEP will be used to signal the route failure to thenetwork nodes, increasing the amount of data frame lostduring the process. Furthermore, SC exchanges may needmore than two attempts to complete, since BER may af-fect the contents of the respective primitives at any nodeof the simulation environment.

Overall, there is a significant increase of the loss ratiowhen FCNSEP is applied. In contrast to the model of Fig-ure 7, we have introduced in this environment two addi-tional delay parameters, namely the insertion and queuinglosses of the subnetworks present in the topology. Thisapproach enabled the simulation of a realistic networkmodel, where message reception timers may be expireddue to the queuing of the FCNS frames and FCNSEPmessages at the router buffers, or due to a node switch-ing messages slower than the peer sending and receivingrates.

Figure 11: FCNS loss ratio - Variable BER, constant datasize and RTT of 260 msec

To enable the identification of the FCNS packetthroughput effects, the observation of Figure 12 is pro-vided.

The throughput difference falls into the area of 64,133bits or 5 packets for small error probabilities, rising tomore than 103,807 bits or 8 packets for larger BER. Giventhat message and service primitives processing times at

Figure 12: FCNS packet throughput - Variable BER, con-stant data size and RTT of 260 msec

the FCNS instances are identical to those of the modelpresented in Figure 7, then the response obtained con-forms to the design expectations of the FCNSEP.

7 Conclusions

In this paper, the error protocol of the FCNS architec-ture has been presented. FCNSEP defines a frameworkfor use within network architectures, where explicit errornotification should take place irrespective of the technol-ogy supporting the connection. At any given time, anerroneous situation such as a faulty transmission link orexcessive congestion could arise in a network topology, aswell as procedural errors for the stack protocols. Thismandates the need for an architecture that can providefor the signalling of the error parameters throughout theenvironment nodes.

The ICMP has been described, including details ofidentified disadvantages and implementation pitfalls ofthe architecture. The overall security of the ICMP systemrelies on external to the protocol parameters and set ofcommunication rules, in contrast to the FCNSEP wheresecurity services are afforded for the protocol indepen-dently of the underlying network structure and FCNSimplementation. Moreover, FCNSEP addresses a widevariety of error conditions that could affect the communi-cation flow, reporting any condition to the system and/orthe peer entity and not only those specific for the link-based data transmission. Finally, FCNSEP is not boundby the functionality of the FCNS stack and hence canbe used in virtually any packet-switched architecture andtelecommunication system.

The use of FCNSEP constitutes a last resort in at-tempting to notify and recover from an error network sit-uation. Parameters such as congestion control can beadded at the user frames or packets, to reduce the over-head that could be produced by the FCNSEP messages.However it is imperative that there exists a means of alert-

Page 11: Secure Error Signalling for Packet-Switched Networks - The ...ijns.jalaxy.com.tw/contents/ijns-v5-n3/ijns-2007-v5-n3-p...the TCP/IP stack, ICMP currently forms the only er-ror signalling

International Journal of Network Security, Vol.5, No.3, PP.347–358, Nov. 2007 357

ing the system administrator of any situation that couldendanger the communication process, enabling not onlythe correction of such a situation but the initiation of theappropriate mechanisms that could afford its future pre-vention.

FCNSEP can support the notification of the networkelements involved in the communication process, irrespec-tive of the nature of the network they reside, thus offeringa degree of connection monitoring throughout all phasesof the association. Current research focuses on applyinga robust and secure error signalling mechanism for adhocwireless and sensor networks and, hence, the refinementof FCNSEP for use in such environments. The particu-larities of such topologies lay, in most of the cases, in theabsence of a dedicated server that could act as the inter-mediate between the peer network and the network man-agement system. That interface could enable the trans-mission of the respective actions inside the ERROR REPand ERROR RESP messages in an erroneous situation.However, the independence of such networks signifies theneed for a more flexible architecture. In this context, theprovision of FCNSEP as the error signalling/notificationarchitecture supporting all packet-switched architecturescan enable the secure deployment of virtually any networktopology, with applications ranging from the academia tomilitary communications.

References

[1] Anon, Open Systems Interconnection - Basic Ref-erence Model part 2: Security Architecture, Inter-national Standards Organisation (ISO), Informationprocessing systems, ISO 7498-2, 1989.

[2] Anon, Secure Hash Standard, Federal InformationProcessing Standards (FIPS), Publication 180-2,2002.

[3] Anon, CERT Coordination Centre, CERT/CCVulnerability Notes VU#471084, VU#104823,VU#221164, VU#471084 and VU#612833, Soft-ware Engineering Institute, Carnegie MellonUniversity, USA, 2002-2003. (http://www.cert.org)

[4] S. Bellovin, “Problem areas for the IP security proto-cols,” in Proceedings of the 6th Usenix UNIX SecuritySymposium, pp. 1-16, 1996.

[5] S. Bellovin, “Probable plaintext cryptanalysis of theIP security protocols,” in Proceedings of the 1997Symposium on Network and Distributed Systems Se-curity, Institution of Electrical and Electronic Engi-neers (IEEE), pp. 52-60, 1997.

[6] D. Brumley and D. Boneh, Cryptographic Librariesand Applications Do not Adequately Defend AgainstTiming Attacks, CERT Coordination Centre, Soft-ware Engineering Institute, Carnegie Mellon Univer-sity, USA, CERT Vulnerability note VU #997481,2003. (http://www.cert.org)

[7] A. Conta and S. Deering, Internet Control MessageProtocol (ICMPv6) for the Internet Protocol version6 (IPv6) specification, IETF RFC 2463, 1998.

[8] S. Deering and R. Hinden, Internet Protocol version6 (IPv6) specification, IETF RFC 2460, 1998.

[9] C. Ellison and B. Schneier, “Ten risks of PKI: whatyou’ve not being told about public key infrastruc-ture,” Computer and Security Journal, vol. 16, no.1, pp. 1-7, 2000.

[10] N. Ferguson and B. Schneier, A Cryptographic Eval-uation of IPsec, Counterpane Internet Security Inc,1999. (http://www.counterpane.com)

[11] IETF, IPv6 Operations (v6ops) documents, 2003-2005. (http://www.ietf.org)

[12] Insecure Security Focus Group Mailing Lists.(http://lists.insecure.org)

[13] IPng Mailing List, Western Computers UsersGroup, Western Washington University, USA.(http://www.wcug.wwu.edu/lists/ipng)

[14] S. Kent and R. Atkinson, Security Architecture forthe IP, IETF RFC 2401, 1998.

[15] P. Kirstein, Factors Influencing IPv6 Deployment,IR6 WINIT, European Commission IPv6 Task Force,1st phase, 2001. (http://www.ec.ipv6tf.org/in/i-documentosOLD.php)

[16] S. Lin and J. D. J. Costello, Error Control Coding:Fundamentals and Applications, Prentice-Hall, 1983.

[17] A. Manion, Multiple Vendors IKE ImplementationsDo not Properly Handle IKE Packets, CERT Co-ordination Centre, Software Engineering Institute,Carnegie Mellon University, USA, Vulnerability nodeVU#287771, 2003. (http://www.cert.org)

[18] P. Nikander, Denial of Service, Address Own-ership and Early Authentication in the IPv6World, Ericsson Research, Finland, 2001.(http://www.tcm.hut.fi)

[19] A. Nuopponen and S. Vaarala, “Attacking pre-dictable IPsec ESP Initialisation Vectors,” LNCS2513, pp. 160-172, Springer-Verlag, 2002.

[20] N. Olifer and V. Olifer, Computer Networks: Princi-ples, Technologies and Protocols for Network Design,John Wiley and Sons Ltd, 2005.

[21] T. Sabin, Multiple IPsec Implementations Do notAdequately Validate Authentication Data, CERT Co-ordination Centre, Software Engineering Institute,Carnegie Mellon University, USA, CERT Vulnerabil-ity note VU #459371, 2002. (http://www.cert.org)

[22] T. Stergiou, D. Delivasilis, R. Green, and M. S. Lee-son, “Future core networks system (FCNS) - A se-cure signalling protocol stack for the UMTS core net-work,” in Proceedings of the IEE 3G2002 Conference,vol. 489, pp. 329-333, London, UK, 2002.

[23] T. Stergiou, R. Green, and M. S. Leeson, “Proto-col stack design for 3rd generation mobile systems- UMTS core network,” in Proceedings of the ThirdInternational Network Conference, pp. 485-493, Ply-mouth, UK, 2002.

[24] T. Stergiou, M. S. Leeson, and R. J. Green, “An al-ternative architectural framework to the OSI securitymodel,” Computers & Security Journal, vol. 23, no.2, pp. 137-153, Elsevier, 2004.

Page 12: Secure Error Signalling for Packet-Switched Networks - The ...ijns.jalaxy.com.tw/contents/ijns-v5-n3/ijns-2007-v5-n3-p...the TCP/IP stack, ICMP currently forms the only er-ror signalling

International Journal of Network Security, Vol.5, No.3, PP.347–358, Nov. 2007 358

[25] M. Szalay, A Special Attack Against IPsec,SANS Information Security Reading Room, 2000.(http://rr.sans.org)

[26] A. Vargas 2005, OMNET++ 2.0 Discrete Event Sim-ulator, Technical University of Budapest, Hungary.(http://whale.hit.bme.hu/omnetpp)

[27] X. Wang, Y. L. Yin, and H. Yu, Collision SearchAttacks on SHA1, Shandong University, China, 2005.

Theodore Stergiou has received hisPhD in Engineering from the Univer-sity of Warwick, UK in 2004, for proto-col security issues in third generationtelecommunication systems. He hasbeen involved since in academic lectur-ing in the area of computer networksand security, as well as in acting as an

independent security consultant. His research interestsinclude secure communication protocols design, wirelessand mobile security, sensor network security, clinical infor-mation systems security, intrusion detection/preventionand intrusion tolarance mechanisms. Currently, he isan external member of the Business System IntegrationTeam of Vodafone S.A. Hellas. He is an active reviewerfor the IEEE Communication Letters, IEEE Transactionson Computers, the International Journal of Network Se-curity, IEEE Globecom 06 and IEEE ICC 07. Dr Ster-giou is a member of the Institution of Engineering andTechnology, UK (MIET) and a member of the Institutionof Electrical and Electronic Engineers (MIEEE). He alsoserves as a member of the IEEE Communications Societyand the Communications and Information Security Tech-nical Committee.

Dimitrios L. Delivasilis was born inGreece in 1976. He holds a B.Eng. inComputer Hardware and Software En-gineering, an MSc. in Data Communi-cation Systems and a Ph.D. in DataSecurity for Third Generation (3G)Telecommunication Systems, from theuniversities of Coventry, Brunel and

Warwick respectively. Prior to the beginning of his aca-demic career he has obtained over four years commercialexperience in R&D departments of telecommunication in-dustry, in the countries of England and Greece. His cur-rent research interests include wireless security, crypto-graphic algorithms, intrusion tolerance systems and bio-metrics. His published scientific work includes several in-ternational journals and conferences, as well as, a filedBritish patent. He is a member of International Associ-ation for Cryptologic Research (IACR), IEEE ComputerSociety and serves as a reviewer for IEE Proceedings.