DocumentCode :
769549
Title :
Hop integrity in computer networks
Author :
Gouda, Mohamed G. ; Elnozahy, E.N. ; Huang, Chin-Tser ; McGuire, Tommy M.
Author_Institution :
Dept. of Comput. Sci., Texas Univ., Austin, TX, USA
Volume :
10
Issue :
3
fYear :
2002
fDate :
6/1/2002 12:00:00 AM
Firstpage :
308
Lastpage :
319
Abstract :
A computer network is said to provide hop integrity if, when any router, p, in the network receives a message, m, supposedly from an adjacent router, q, then p can check that m was indeed sent by q, was not modified after it was sent and was not a replay of an old message sent from q to p. We describe three protocols that can be added to the routers in a computer network so that the network can provide hop integrity, and thus overcome most denial-of-service attacks. These three protocols are a secret exchange protocol, a weak integrity protocol and a strong integrity protocol. All three protocols are stateless, require small overhead and do not constrain the network protocol in the routers in any way
Keywords :
Internet; message authentication; protocols; telecommunication network routing; telecommunication security; Internet; authentication; computer network routers; denial-of-service attacks; hop integrity; network protocol; secret exchange protocol; stateless protocol; strong integrity protocol; weak integrity protocol; Access protocols; Computer crime; Computer networks; Computer science education; Educational programs; IP networks; Intelligent networks; Internet; System software; TCPIP;
fLanguage :
English
Journal_Title :
Networking, IEEE/ACM Transactions on
Publisher :
ieee
ISSN :
1063-6692
Type :
jour
DOI :
10.1109/TNET.2002.1012363
Filename :
1012363
Link To Document :
بازگشت