2020
DOI: 10.1145/3409796
|View full text |Cite
|
Sign up to set email alerts
|

Unveiling the Mystery of Internet Packet Forwarding

Abstract: Validating the network paths taken by packets is critical in constructing a secure Internet architecture. Any feasible solution must both enforce packet forwarding along end-host specified paths and verify whether packets have taken those paths. However, the current Internet supports neither enforcement nor verification. Likely due to the radical changes to the Internet architecture and a long-standing confusion between routing and forwarding, only limited solutions for path validation exist in the literature.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 68 publications
0
11
0
Order By: Relevance
“…Path validation in networks is a critical task for security and reliability of the networks [9]. Path validation is the combination of two main sub-tasks: path enforcement and path verification [9].…”
Section: Path Validationmentioning
confidence: 99%
See 1 more Smart Citation
“…Path validation in networks is a critical task for security and reliability of the networks [9]. Path validation is the combination of two main sub-tasks: path enforcement and path verification [9].…”
Section: Path Validationmentioning
confidence: 99%
“…Path validation in networks is a critical task for security and reliability of the networks [9]. Path validation is the combination of two main sub-tasks: path enforcement and path verification [9]. For the former, a source node should be able to specify the path (or paths) that a packet must follow to reach a destination node, and the intermediate hops on the path should be able to enforce the path when processing the packet.…”
Section: Path Validationmentioning
confidence: 99%
“…Path-Aware Networking (PAN) enables end-hosts to select the path they want for their data to follow at the level of ASs [20]. This functionality has been actively investigated and discussed under the Internet Research Task Force (IRTF) and the IETF in the last years [7]. PAN is already considered indispensable for constructing a secure Internet architecture and is implemented in several experimental Internet designs, such as SCION and NEBULA [2].…”
Section: Cross-domain Controllabilitymentioning
confidence: 99%
“…PAN is already considered indispensable for constructing a secure Internet architecture and is implemented in several experimental Internet designs, such as SCION and NEBULA [2]. A PAN consists of two essential properties, namely Path Enforcement and Path Verification [7]. Path Enforcement consists of enforcing that selected path preferences are followed and Path Verification adds the capability of retrieving the paths taken by network packets for auditing.…”
Section: Cross-domain Controllabilitymentioning
confidence: 99%
See 1 more Smart Citation