Hop integrity in computer networks
IEEE/ACM Transactions on Networking (TON)
On the Security and Vulnerability of PING
WSS '01 Proceedings of the 5th International Workshop on Self-Stabilizing Systems
IEEE/ACM Transactions on Networking (TON)
On the power of non-spoofing adversaries
DISC'10 Proceedings of the 24th international conference on Distributed computing
Hi-index | 0.00 |
A computer network is said to provide hop integrity iff when any router p in the network receives a message m supposedly from an adjacent router q, then p can check that m was indeed sent by q, was not modified after it was sent, and was not a replay of an old message sent from q to p. We describe three protocols that can be added to the routers in a computer network so that the network can provide hop integrity. These three protocols are a secret exchange protocol, a weak integrity protocol, and a strong integrity protocol. All three protocols are stateless, require small overhead, and do not constrain the network protocol in the routers in any way.