In this paper, the authors use SPI calculus to analyze the demand loading code protocol of active network. The security flaw of being replay attack in this protocol is found. Model of active network is different from the tradition network. Since the model of active network is compute-storage-forward, and the model of tradition network is storage-forward. The replay attack would make the unexpected result for active network and letdown the performance and efficiency of active node. In order to prevent the replay attack, the authors amend the protocol and enhance the capacity for preventing replay attack.
[1]Xia ZY, Zhang SY. Survey of active network research. Mini-Microsystems, 2003,24(10):1821-1824 (in Chinese with English abstract).
[2]Tennenhouse DL, Smith JM, Sincoskie WD, Wetherall DJ, Minden G. A survey of active network research. IEEE Communication Magazine, 1997,35(1):80-86.
[3]Tennhouse DL, Wetherall DJ. Towards an active network architecture. Computer Communication Review, 1996,26(2):464-472.
[4]Calvert KL. Architectural framework for active networks. Version 1.0 University of Kentucky, 1999. http://www.ccgatech.edu/project/canes/papers/arch- 1-0.ps.gz
[5]Wetherall DJ, Guttag JV, Tennenhouse DL. ANTS: A toolkit for building and dynamically deploying network protocols. In: IEEE Openarch'98. IEEE, 1998. 117.
[6]Schwartz B, Jackson AW, Strayer WT, Zhou WY, Rockwell RD, Partridge C. Smart packet for active networks. In: Proc. of the 1999 IEEE 2nd Conf. on Open Architectures and Network Programming (OPENARCH'99). 1999.
[7]Nygren EL, Garland S J, Kaashoek MF. PAN: A high-performance active network node supporting multiple mobile code system. In:Proc. of the 1999 IEEE 2nd Conf. on Open Architecture and Network Programming. 1999.
[8]AN Node OS Working Group. NodeOS interface specification. 2000. http://www.cs.princeton.edu/nsg/papers/nodeos.ps
[9]Xia ZY, Zhang SY, Zhong YP. A kind of security negotiation protocol for active network. In: Proc. of the Conf. the ACM Information Security 2002.2002. 156-162.
[10]Zhou YZ, Zhang YX. A program transfer protocol for active network. In: Proc. of the Int'l Conf. on Telecommunications 2002.Vol.3, 2002.
[11]Xia ZY, Zhang SY. Design of secure system architecture model for active network. Journal of Software, 2002,13(8):1352-1360.http://www.j os.org.cn/1000-9825/1352.htm
[12]Lindell B. Active networks protocol specification for Hop-By-Hop message authentication and integrity. Draft-nodeos-security00.txt. 2000. http://www.isi.edu/abone/Documents/Ossec.txt
[13]Liu ZY, Campbell RH. Securing the Node of Active Networks. Kluwer Academic Publishers, 2000.
[14]Campbell RH, Liu ZY. Dynamic interoperable security architecture for active network. In: Proc. of the IEEE Openarch 2000. 2000.32-41.
[15]Lu YM, Qian DP, Xu Bin, Wang L. Execution environments for active network based on programmable mobile soft devices.Journal of Software, 2002,13(2):227-234 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/13/1352.pdf
[16]Alexander DS, Braden B, Gunter CA, Jackson AW, Keromytis AD, Minden GJ, Wetherall D. Active network encapsulation protocol (ANEP). 1997. http://www.cis.upenn.edu/switchware/ANEP/docs/ANEP.txt
[17]Wetherall D, Tennenhouse D. Active IP Option. In: Proc. of the 7th ACM SIGOPS European Workshop ACM. 1996.
[18]Abadi M, Gordon A. A calculus for cryptographic protocols: The SPI calculus. Information and Computation, 1999,148(1): 1-70.