Automated Validation of DNSSEC

  • Kollapalli Ramesh Babu
  • Vineet Padmanabhan
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 710)


Nowadays, the usage of Internet and network-based services has become common. Some of the services are very critical and require robust security to avoid intolerable consequences. As we all know, to provide such services, a robust cryptographic technique-based security protocol must be used. The designing of such a secure protocol is always a challenging task. The complexity of security protocols is getting high day by day, due to their functionalities and type of services that they provide to protect the resources from unauthorized accesses. As the complexity grows, it becomes very difficult and tedious task to verify its correctness manually. Therefore, we need some automatic mechanism to verify and validate the correctness of a given security protocol. The problem that we addressed in this paper is validation of the security protocol DNSSEC using automated verification tool called AVISPA.


Cryptographic techniques DNSSEC AVISPA 


  1. 1.
    Roger M. Needham and Michael D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12): 993–999, 1978.Google Scholar
  2. 2.
    Michael Burrows, Martin Abadi, and Roger M. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1): 1836, 1990.Google Scholar
  3. 3.
    Gavin Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56(3): 131–133, 1995.Google Scholar
  4. 4.
    P. Mockapetris. Domain Names: Concepts and Facilities. Request for Comments 1034, Nov. 1987.Google Scholar
  5. 5.
    P. Mockapetris and K. Dunlop. Development of the Domain Name System. In Proc. of ACM SIGCOMM, Stanford, CA, 1988.Google Scholar
  6. 6.
    R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose, Dns security introduction and requirements, RFC 4033, Internet Engineering Task Force, 1, March, 2005.Google Scholar
  7. 7.
    R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose, Resource records for the dns security extensions, RFC 4034, Internet Engineering Task Force, 1, March, 2005.Google Scholar
  8. 8.
    Kollapalli Ramesh Babu, Vineet Padmanabhan, Wilson Naik Bhukya: Reasoning about DNSSEC. MIWAI 2011: 75–86.Google Scholar
  9. 9.
    The AVISPA team, AVISPA v1.1 User Manual, 2006.Google Scholar
  10. 10.
    A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P. C. Heam, O. Kouchnarenko, J. Mantovani, S. Modersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Vigan‘o, and L. Vigneron. The avispa tool for the automated validation of internet security protocols and applications, pp. 281–285, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005.Google Scholar
  11. 11.
    The AVISPA team, HLPSL Tutorial, 2006.Google Scholar
  12. 12.
    Chevalier, Y., Compagna, L., Cuellar, J., Hankes Drielsma, P., Mantovani, J., Mdersheim, S., Vigneron, L.: A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. In: Proc. SAPS 2004. Austrian Computer Society, 2004.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.School of Computer & Information ScienceUniversity of HyderabadHyderabadIndia

Personalised recommendations