2018
DOI: 10.1109/access.2018.2879489
|View full text |Cite
|
Sign up to set email alerts
|

Network-Layer Accountability Protocols: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 57 publications
0
3
0
Order By: Relevance
“…is study follows the definition of network layer accountability similar to that in [1,7,13], i.e., the ability to identify the source of a specific packet and take countermeasures in case of misbehaviors. We mainly concern cryptography-based mechanisms which can establish an unforgeable association between the entity and the packet sent through the cryptographic mechanism.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…is study follows the definition of network layer accountability similar to that in [1,7,13], i.e., the ability to identify the source of a specific packet and take countermeasures in case of misbehaviors. We mainly concern cryptography-based mechanisms which can establish an unforgeable association between the entity and the packet sent through the cryptographic mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…Accountability in the network is a means to identify the sources of traffic for two purposes: to selectively filter abusive or noncompliant traffic from malicious sources on a perdestination basis, while permitting traffic from others to proceed, and to report and disconnect abusive machines before they attack others [1]. e lack of accountability in current Internet architecture facilitates malicious or infected hosts arbitrarily spoof their source addresses to evade responsibility for their malicious packets [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation