Trustworthy Routing Despite Insecure Providers
نویسندگان
چکیده
Computer networks today typically do not provide any mechanisms to the users to learn, in a reliable manner, which paths have (and have not!) been taken by their packets. Rather, it seems inevitable that as soon as a packet leaves the network card, the user is forced to trust the network provider to forward the packets as expected or agreed upon. This can be undesirable, especially in the light of today’s trend toward more programmable networks: after a successful cyber attack on the network management system or Software-Defined Network (SDN) control plane, an adversary in principle has complete control over the network. This paper presents a low-cost and efficient solution to detect misbehaviors and ensure trustworthy routing over untrusted or insecure providers, in particular providers whose management system or control plane has been compromised (e.g., using a cyber attack). We propose Routing-Verification-as-a-Service (RVaaS): RVaaS offers clients a flexible interface to query information relevant to their traffic, while respecting the autonomy of the network provider. RVaaS leverages key features of OpenFlow-based SDNs to combine (passive and active) configuration monitoring, logical data plane verification and actual in-band tests, in a novel manner.
منابع مشابه
An Intelligent Efficient Secure Routing Protocol for MANET
The security issues are more complex and challenging in Mobile Ad hoc Networks (MANETs) than other conventional wireless networks due to peer to peer behavior of the participating nodes, absence of centralized routers and routing through intermediate nodes. For successful communication between a pair of source and destination it is vital that the intermediate nodes be trustworthy and don’t drop...
متن کاملSecure Routing in Wireless Sensor Network
Wireless Sensor Networks is the new concept in the field of networks consists of small, large number of sensing nodes which is having the sensing, computational and transmission power. Due to the lack of tamper-resistant packaging and the insecure nature of wireless communication channels, these networks are vulnerable to internal and external attacks. Moreover, routing protocols are designed, ...
متن کاملSurveying Solutions to Securing On-Demand Routing Protocols in MANETs
----------------------------------------------------------------------ABSTRACT-------------------------------------------------------------A Mobile ad hoc Network or MANET is a wireless network of mobile devices that has the ability to self-configure and self-organise and is characterised by an absence of centralised administration and network infrastructure. An appreciable number of routing pr...
متن کاملTrustworthy Route formation Algorithm for WSNs
This paper introduces a new algorithm for the formation of trustworthy route from source node to Base Station (BS) for secure routing of messages in Wireless Sensor Networks (WSNs). This algorithm process the information given by the Trust dependent Link State Routing Protocol which is improved version of our Routing Protocol presented in [1] Direct Trust dependent Link State Routing Protocol b...
متن کاملDeveloping and Implementing a Food Insecurity Screening Initiative for Patients Living with Diabetes.
OBJECTIVES Routine food insecurity screening is recommended in diabetes care to inform more tailored interventions that better support diabetes self-management among food-insecure patients. This pilot study explored the acceptability and feasibility of a food insecurity screening initiative within a diabetes care setting in Toronto. METHODS A systematic literature review informed the developm...
متن کامل