Information Technology Reference
In-Depth Information
notification, optionally forwarded to the source. Every receiver of a NextHop notifica-
tion will be in the position to audit the delivery and eventually to discover any black
or grey hole [21] along the path.Auditing is just inspecting contents of routing cache
of other members, as in Fig. 4 (b) to see whether datagrams have been really relayed.
This kind of auditing is a natural step in community collaboration: recall that FIB is
being computed by a node based on routing information offered by community mem-
bers. Of course access to private parts of RC can be protected by access control rules.
Following etiquette rules the nodes shall exhibit their active workflows; for sim-
plicity we assume that all potential workflows from Fig. 3 are being simultaneously
active. Expressions (7) through (9) present etiquette behaviours induced by E1 — E3
as observed in message boxes. Etiquette shall eventually establish trust between A.a
and B.a within IPv4 connectivity, and between C.b and B.b within IPv6 connectivity,
as reflected in Fig. 5. The behaviours are partial in a sense that message sequences
outlined in (7)-(9) will appear in the same message box of each node due to the as-
sumption of them having one message box per concern.
Assuming that trust was established, we apply a cross operator and re-write rules
(5) to each node's message box that results in certain residuals as in (10). The (10)
shows that certain workflows due to their incompatibility cannot be used to establish a
trust based on the proposed etiquette; for example there is no trust between nodes A
and C . However as it is obvious from Fig. 2 it might be possible for A and C to use
node B as a trusted third party.
a A
Legend:
- Trusted exchange
- In-node workflow
- Trust in progress
A.a - workflow a in node A
a A
B.a
A.a
a B
d C
d C
C.d
B.c
b B
- advertisement of A.a
- node boundary
- workflow process
c B
b C
C.b
B.b
b B
Fig. 5. Sample etiquette communication graph
This will require modification of etiquette rules, i.e. introducing a new e-rule al-
lowing trust delegation or trust transfer, which might be regarded in general as a non-
desired feature from security viewpoint. In case one of the nodes is a malicious one,
e.g. acting as a black hole the cross operator applied to message boxes of the nodes
whose media datagrams would have been dropped will result in more residuals and no
trust.
Search WWH ::




Custom Search