Abstract
In-network source authentication and path validation are fundamental primitives to construct higher-level security mechanisms such as DDoS mitigation, path compliance, packet attribution, or protection against flow redirection. Unfortunately, currently proposed solutions either fall short of addressing important security concerns or require a substantial amount of router overhead. In this paper, we propose lightweight, scalable, and secure protocols for shared key setup, source authentication, and path validation. Our prototype implementation demonstrates the efficiency and scalability of the protocols, especially for software-based implementations.
Original language | English (US) |
---|---|
Pages (from-to) | 271-282 |
Number of pages | 12 |
Journal | Computer Communication Review |
Volume | 44 |
Issue number | 4 |
DOIs | |
State | Published - Feb 25 2015 |
Event | ACM SIGCOMM 2014 Conference - Chicago, United States Duration: Aug 17 2014 → Aug 22 2014 |
Keywords
- Path validation
- Retroactive key setup
- Source authentication
ASJC Scopus subject areas
- Software
- Computer Networks and Communications