[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1477942.1477965acmconferencesArticle/Chapter ViewAbstractPublication PagesancsConference Proceedingsconference-collections
poster

Data path credentials for high-performance capabilities-based networks

Published: 06 November 2008 Publication History

Abstract

Capabilities-based networks present a fundamental shift in the security design of network architectures. Instead of permitting the transmission of packets from any source to any destination, routers deny forwarding by default. For a successful transmission, packets need to positively identify themselves and their permissions to the router. The analysis of the data path credentials data structure that we propose shows that as few as 128 bits are sufficient to reduce the probability of unauthorized traffic reaching its destination to a fraction of a percent.

References

[1]
Anderson, T., Roscoe, T., and Wetherall, D. Preventing Internet denial-of-service with capabilities. SIGCOMM Computer Communication Review 34, 1 (Jan. 2004), 39--44.
[2]
Ballani, H., Chawathe, Y., Ratnasamy, S., Roscoe, T., and Shenker, S. Off by default! In Proc. of Fourth Workshop on Hot Topics in Networks (HotNets-IV) (College Park, MD, Nov. 2005).
[3]
Wolf, T. A credential-based data path architecture for assurable global networking. In Proc. of the 2007 IEEE Conference on Military Communications (MILCOM) (Orlando, FL, Oct. 2007).
[4]
Wolf, T. Design of a network architecture with inherent data path security. In Proc. of ACM/IEEE Symposium on Architectures for Networking and Communication Systems (ANCS) (Orlando, FL, Dec. 2007), pp. 39--40.

Cited By

View all
  • (2015)A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2013.4412:3(256-269)Online publication date: May-2015
  • (2013)High-performance capabilities for 1-hop containment of network attacksIEEE/ACM Transactions on Networking10.1109/TNET.2013.224046321:6(1931-1946)Online publication date: 1-Dec-2013
  • (2012)A Lightweight Secure Provenance Scheme for Wireless Sensor NetworksProceedings of the 2012 IEEE 18th International Conference on Parallel and Distributed Systems10.1109/ICPADS.2012.24(101-108)Online publication date: 17-Dec-2012
  • Show More Cited By

Index Terms

  1. Data path credentials for high-performance capabilities-based networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ANCS '08: Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
    November 2008
    191 pages
    ISBN:9781605583464
    DOI:10.1145/1477942
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 November 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Poster

    Funding Sources

    Conference

    ANCS '08

    Acceptance Rates

    ANCS '08 Paper Acceptance Rate 17 of 67 submissions, 25%;
    Overall Acceptance Rate 88 of 314 submissions, 28%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 26 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2015)A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2013.4412:3(256-269)Online publication date: May-2015
    • (2013)High-performance capabilities for 1-hop containment of network attacksIEEE/ACM Transactions on Networking10.1109/TNET.2013.224046321:6(1931-1946)Online publication date: 1-Dec-2013
    • (2012)A Lightweight Secure Provenance Scheme for Wireless Sensor NetworksProceedings of the 2012 IEEE 18th International Conference on Parallel and Distributed Systems10.1109/ICPADS.2012.24(101-108)Online publication date: 17-Dec-2012
    • (2010)Design of a secure packet processorProceedings of the 6th ACM/IEEE Symposium on Architectures for Networking and Communications Systems10.1145/1872007.1872011(1-10)Online publication date: 25-Oct-2010
    • (2009)A high-performance capabilities-based network protocol2009 5th IEEE Workshop on Secure Network Protocols10.1109/NPSEC.2009.5342257(1-6)Online publication date: Oct-2009

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media