27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hind Al Falasi and Liren Zhang<br />

packets at once. Therefore, for every sequence of packets sent, only one piece of useful information<br />

is sent via one acknowledgment. However, the high security network can set the size of the sliding<br />

window to one which requires that every packet is acknowledged before the next one is sent, sending<br />

us back to square one.<br />

4. The covert channel analysis<br />

4.1 Notations<br />

The following acronyms are used in the paper: LSN stands for Low Security Network, and HSN<br />

stands for High Security Network.<br />

Table 1: The table contains the notations we will use throughout the paper, and in the illustration<br />

figures<br />

4.2 Assumptions<br />

LSN SAFP: λ 1<br />

SAFP LSN:µ1<br />

LSN SAFP = T1<br />

LSN SAFP = α1<br />

RL: Ack rate from SAFP LSN<br />

Arrival Rate = λ<br />

Service Rate = µ<br />

Packet Size = Ri<br />

Queuing Delay = q<br />

Transmission delay = Tx<br />

Propagation Delay:<br />

Acknowledgement Rate (Ack/sec):<br />

SAFP HSN: λ 2<br />

HSN SAFP: µ2<br />

SAFP HSN = T2<br />

SAFP HSN = α2<br />

RH: Ack rate from HSN SAFP<br />

T1 and T2 of the acknowledgment packets are ignored because the packet size is small. In addition,<br />

the processing (service) time at SAFP is negligible.<br />

4.3 Discussion<br />

In this section, we investigate the time it takes one packet to travel from the low security network to<br />

the high security network. In addition, we investigate the time it takes an acknowledgement of the<br />

packet to reach the SAFP; as well as the time an acknowledgment from the SAFP to low security<br />

network takes to reach its destination. Calculating the time from the SAFP point of view; the i th packet<br />

is received at α1 + T1. Moreover, the i th packet is deleted from the buffer at α1 + T1 + 2α2 + T2 + 1/ µ2,<br />

where α1 represents the propagation delay of the packets sent between the low security network and<br />

the SAFP. Similarly, α2 represents the propagation delay of the packets sent between the SAFP and<br />

the high security network. T1 and T2 represent the transmission delay from the low security network to<br />

the SAFP, and the SAFP and the high security network, respectively. Finally, 1/ µ2 is the service time<br />

at the high security network.<br />

When we take the distance between the SAFP gateway and the high security network into<br />

consideration, the time a packet stays in the SAFP buffer changes. For example, if the distance is<br />

very large, then we can ignore T2 and 1/ µ2. Therefore, the i th packet is deleted from the buffer at α1 +<br />

T1 + 2α2. As a result, the ability of the high security network to control the acknowledgment rates;<br />

10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!