Network protocol developers typically go through a tedious and error-prone process of testing and debugging their protocol implementation for various settings. They perform a number of tasks manually such as configuration of numerous network settings, controlled reproduction of unexpected protocol behavior, and traffic capture and analysis. Once fully tested, network protocols can be deployed in production networks. To speed up protocol development, developers need convenient testing and debugging tools. In this thesis, we present a Protocol Testing and Evaluation System (PTES) to assist developers in transparently testing their protocol implementations. The core part of PTES is a rule-based network testing and evaluation framework. PTES enables a protocol developer to construct and execute various controlled and repeatable testing scenarios. The developer can use simple iptables-like rules to specify various local and distributed network events and actions. During protocol execution, PTES triggers these events and actions in a coordinated manner and records the protocol responses to these events which can later be examined by the developer. We present the design and implementation of three variants of PTES for native, simulated, and emulated platforms for both wired and wireless networks. We also demonstrate the utility of PTES by automating the testing of TCP/IP and Optimized Link State Routing (OLSR) protocols.
Recommendations
Generic Fair Non-Repudiation Protocols with Transparent Off-line TTP
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005A non-repudiation protocol is aimed for exchanging a digital message and an irrefutable receipt between two mistrusting parties over the Internet. Such a protocol is said fair, if at the end of any possible protocol execution, either both parties obtain ...
Generic non-repudiation protocols supporting transparent off-line TTP
On IWAP'05A non-repudiation protocol enables the fair exchange of an electronic message and an irrefutable digital receipt between two mistrusting parties over the Internet. That is, at the end of any execution instance of such a protocol, either both parties ...
Distributed Protocols for Oblivious Transfer and Polynomial Evaluation
Progress in Cryptology – INDOCRYPT 2023AbstractA secure multiparty computation (MPC) allows several parties to compute a function over their inputs while keeping their inputs private. In its basic setting, the protocol involves only parties that hold inputs. In distributed MPC, there are also ...