Abstract: Designing infrastructures that give trustworthy third parties (such as end-hosts) control over routing is a promising research direction for achieving flexible and efficient communication. Even so, serious concerns remain over the deployment of such infrastructures, particularly the new security vulnerabilities they introduce. The flexible control plane of these infrastructures can be used to launch many types of powerful attacks with little effort. In this paper, we make several contributions towards studying security issues in forwarding structure (FIs). We present a general model for an FI, analyse potential security vulnerabilities, and present method to address these vulnerabilities. The main method that we introduce in this paper is to use the simple lightweight is cryptographic constraint. It is possible to keep a large class of attacks on end- hosts and bound the flooding attacks. Our mechanisms are general and apply to a variety of earlier proposals such as , Data Router, and Network Pointers. Key Words : Internet architecture, cover networks, security.


PDF | DOI: 10.17148/IJARCCE.2022.114130

Open chat
Chat with IJARCCE