Lightweight source authentication and path validation

Tiffany Hyun Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih Chun Hu, Adrian Perrig

Research output: Contribution to journalConference article

Abstract

In-network source authentication and path validation are fundamental primitives to construct higher-level security mechanisms such as DDoS mitigation, path compliance, packet attribution, or protection against flow redirection. Unfortunately, currently proposed solutions either fall short of addressing important security concerns or require a substantial amount of router overhead. In this paper, we propose lightweight, scalable, and secure protocols for shared key setup, source authentication, and path validation. Our prototype implementation demonstrates the efficiency and scalability of the protocols, especially for software-based implementations.

Original languageEnglish (US)
Pages (from-to)271-282
Number of pages12
JournalComputer Communication Review
Volume44
Issue number4
DOIs
StatePublished - Feb 25 2015
EventACM SIGCOMM 2014 Conference - Chicago, United States
Duration: Aug 17 2014Aug 22 2014

Keywords

  • Path validation
  • Retroactive key setup
  • Source authentication

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Lightweight source authentication and path validation'. Together they form a unique fingerprint.

Cite this