{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00213620","sets":["1164:5251:10517:10742"]},"path":["10742"],"owner":"44499","recid":"213620","title":["セキュア光トランスポートNWの実現に向けたアーキテクチャ設計および形式検証による安全性評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-11-01"},"_buckets":{"deposit":"c16089c8-707e-42aa-b0f0-91909aea477f"},"_deposit":{"id":"213620","pid":{"type":"depid","value":"213620","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"セキュア光トランスポートNWの実現に向けたアーキテクチャ設計および形式検証による安全性評価","author_link":["546866","546867","546868"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"セキュア光トランスポートNWの実現に向けたアーキテクチャ設計および形式検証による安全性評価"},{"subitem_title":"Architecture Design and Security Evaluation with Formal Verification for Secure Optical Transport Network","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2021-11-01","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京大学"},{"subitem_text_value":"NTT社会情報研究所"},{"subitem_text_value":"NTT社会情報研究所"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Tokyo Uniersity","subitem_text_language":"en"},{"subitem_text_value":"NTT Social Informatics Laboratories","subitem_text_language":"en"},{"subitem_text_value":"NTT Social Informatics Laboratories","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/213620/files/IPSJ-EIP21094019.pdf","label":"IPSJ-EIP21094019.pdf"},"date":[{"dateType":"Available","dateValue":"2023-11-01"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-EIP21094019.pdf","filesize":[{"value":"1.0 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"26"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"07c738f7-59d9-4140-bdc7-3afd87b0745f","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"前田, 志温"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中林, 美郷"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"奥田, 哲矢"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11238429","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8647","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本研究では,今後のデータセンタ間通信の主流と期待されるセキュア光トランスポート NW(以降 SOTN)について,そのアーキテクチャの設計および形式化と,想定される攻撃者モデルに対する対策の提案,形式検証による安全性評価を行った.アーキテクチャ設計・形式化においては,従来の拠点間通信の事実上標準である IPsec を参考として,安全性評価においては,暗号利用プロトコルの形式検証ツールの事実上標準である ProVerif を利用した.本研究の結果,想定される攻撃者モデルにおいて,既存の鍵交換装置や認証暗号装置の継ぎ接ぎのみでは,未知の攻撃(Key Compromized Disagreement (KCD) Attackと呼ぶ)が検知されたこと,および,提案する対策により,左記の攻撃の影響を低減できることを示した.上記の結果は,個別に安全性が保証された装置であっても,それらの組合せ設計およびアーキテクチャ設計により,未知の攻撃が発生し得ることを示唆しており,さらに,Passive Adversary を許さない仕組み(具体的には量子鍵交換)を一部の通信路に適用することで,アーキテクチャ全体の安全性が向上するという,従来の情報セキュリティの常識で捉えられない対策が可能であることを示唆するものである.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告電子化知的財産・社会基盤(EIP)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2021-11-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"19","bibliographicVolumeNumber":"2021-EIP-94"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":213620,"updated":"2025-01-19T17:05:46.525741+00:00","links":{},"created":"2025-01-19T01:14:28.665062+00:00"}