Brief announcement: towards a secure indirection infrastructure

  • Authors:
  • Karthik Lakshminarayanan;Daniel Adkins;Adrian Perrig;Ion Stoica

  • Affiliations:
  • University of Calfornia, Berkeley, CA;University of Calfornia, Berkeley, CA;CMU;University of Calfornia, Berkeley, CA

  • Venue:
  • Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing
  • Year:
  • 2004
  • End-host controlled multicast routing

    Computer Networks: The International Journal of Computer and Telecommunications Networking - Overlay distribution structures and their applications

  • End-host controlled multicast routing

    Computer Networks: The International Journal of Computer and Telecommunications Networking - Overlay distribution structures and their applications

Quantified Score

Hi-index 0.00

Visualization

Abstract

Designing a flexible, yet secure communication infrastructure has long been an elusive goal. Most of the proposals that seek to address the problem of flexibility have opened up the system for new forms of attacks. In this paper, we consider one particular proposal, i3 [2], a flexible indirection infrastructure that provides natural support for a multitude of communication primitives such as multicast, anycast and mobility. We systematically identify the attacks on i3, and propose techniques that address the security problems without sacrificing the flexibility that i3 offers. Our techniques, ranging from cryptographically constraining the forwarding entries to challenge-based mechanisms for inserting forwarding entries, while being simple, both conceptually and to implement, make most of the attacks provably hard. We believe that this paper represents an important step towards designing communication infrastructures that are both secure and flexible.