Results 1 -
3 of
3
Lightweight Source Authentication and Path Validation
"... In-network source authentication and path validation are funda-mental primitives to construct higher-level security mechanisms such as DDoS mitigation, path compliance, packet attribution, or protection against flow redirection. Unfortunately, currently pro-posed solutions either fall short of addre ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
(Show Context)
In-network source authentication and path validation are funda-mental primitives to construct higher-level security mechanisms such as DDoS mitigation, path compliance, packet attribution, or protection against flow redirection. Unfortunately, currently pro-posed solutions either fall short of addressing important security concerns or require a substantial amount of router overhead. In this paper, we propose lightweight, scalable, and secure protocols for shared key setup, source authentication, and path validation. Our prototype implementation demonstrates the efficiency and scalabil-ity of the protocols, especially for software-based implementations.
Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation
"... ar ..."
(Show Context)