2017 13th International Conference on Network and Service Management (CNSM) 2017
DOI: 10.23919/cnsm.2017.8255970
|View full text |Cite
|
Sign up to set email alerts
|

Can MPTCP secure Internet communications from man-in-the-middle attacks?

Abstract: Multipath communications at the Internet scale have been a myth for a long time, with no actual protocol being deployed so that multiple paths could be taken by a same connection on the way towards an Internet destination. Recently, the Multipath Transport Control Protocol (MPTCP) extension was standardized and is undergoing a quick adoption in many use-cases, from mobile to fixed access networks, from data-centers to core networks. Among its major benefits -i.e., reliability thanks to backup path rerouting; t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 32 publications
0
5
0
2
Order By: Relevance
“…Jadin et al [41] designed a secure MPTCP variant by closely integrating authentication and encryption inside the MPTCP protocol. Nguyen et al [42] investigated the Autonomous System (AS)-level Man-in-the-Middle (MITM) attacks acting at the robustness of MPTCP communications, reported which countries and regions had a high-level of robustness against the MITM attacks by studying the AS level graph, and provided a countermeasure in preventing MPTCP from the AS-level MITM attacks when concurrently using multiple Internet-scale paths for multipath communications. Munir et al [43] first reported the potential security vulnerabilities in MPTCP due to crosspath interactions among MPTCP subflows, caused by two typical attacks: connection hijack attacks and directed traffic diversion attacks, and then proposed the corresponding countermeasure proposal to guarantee MPTCP to be no less secure than TCP under the two typical attacks.…”
Section: F Mptcp Security Casesmentioning
confidence: 99%
“…Jadin et al [41] designed a secure MPTCP variant by closely integrating authentication and encryption inside the MPTCP protocol. Nguyen et al [42] investigated the Autonomous System (AS)-level Man-in-the-Middle (MITM) attacks acting at the robustness of MPTCP communications, reported which countries and regions had a high-level of robustness against the MITM attacks by studying the AS level graph, and provided a countermeasure in preventing MPTCP from the AS-level MITM attacks when concurrently using multiple Internet-scale paths for multipath communications. Munir et al [43] first reported the potential security vulnerabilities in MPTCP due to crosspath interactions among MPTCP subflows, caused by two typical attacks: connection hijack attacks and directed traffic diversion attacks, and then proposed the corresponding countermeasure proposal to guarantee MPTCP to be no less secure than TCP under the two typical attacks.…”
Section: F Mptcp Security Casesmentioning
confidence: 99%
“…In [36], cryptography based solutions are proposed against eavesdropping. The authors in [6] [43], we attempt to provide a response to such questions.…”
Section: Internet Mitm Attacksmentioning
confidence: 99%
“…Neste caso, o caminho de ida (P ij ) e o de volta (P ji ) podem ser assimétricos, sendo i e j um endereço IP de N s e N d , respectivamente. Contudo, as regras de roteamento não impedem que os caminhos de uma mesma conexão MPTCP compartilhem um ou mais enlaces na rede [Nguyen et al 2017]. Conforme ilustra a Figura 1, os nós de origem N s e de destino N d possuem dois endereços IP cada.…”
Section: Identificando Os Caminhos Não Compartilhadosunclassified
“…O projeto desse escalonador segue a premissa de que os caminhos possuem uma alta diversidade, ou seja, não compartilham enlaces. Porém, isto nãoé válido em redes reais, como a Internet, em que as regras de roteamento tradicionais guiam os pacotes de um fluxo TCP por uma mesma rota [Nguyen et al 2017]. Como o MPTCP utiliza sub-fluxos TCP, as regras de roteamento os consideram como fluxos TCP distintos, podendo ser transmitidos por caminhos compartilhados.…”
Section: Introductionunclassified