Hop integrity in computer networks

A computer network is said to provide hop integrity if, when any router, p, in the network receives a message, m, supposedly from an adjacent router, q, then p can check that m was indeed sent by q, was not modified after it was sent and was not a replay of an old message sent from q to p. We descri...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE/ACM transactions on networking 2002-06, Vol.10 (3), p.308-319
Hauptverfasser: Gouda, M.G., Elnozahy, E.N., Chin-Tser Huang, McGuire, T.M.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 319
container_issue 3
container_start_page 308
container_title IEEE/ACM transactions on networking
container_volume 10
creator Gouda, M.G.
Elnozahy, E.N.
Chin-Tser Huang
McGuire, T.M.
description A computer network is said to provide hop integrity if, when any router, p, in the network receives a message, m, supposedly from an adjacent router, q, then p can check that m was indeed sent by q, was not modified after it was sent and was not a replay of an old message sent from q to p. We describe three protocols that can be added to the routers in a computer network so that the network can provide hop integrity, and thus overcome most denial-of-service attacks. These three protocols are a secret exchange protocol, a weak integrity protocol and a strong integrity protocol. All three protocols are stateless, require small overhead and do not constrain the network protocol in the routers in any way.
doi_str_mv 10.1109/TNET.2002.1012363
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_miscellaneous_907960329</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1012363</ieee_id><sourcerecordid>907960329</sourcerecordid><originalsourceid>FETCH-LOGICAL-c574t-53a2ff6526f51fe068098657860fc184468d6f6b58329af85cc68bc0b2897dbb3</originalsourceid><addsrcrecordid>eNqN0T1PwzAQBmALgUQp_ADEUnWAKeXOHxdnRKhQpAqWMltJaqOUNil2ItR_j6t0QAzA5JP8vDfcy9glwgQRstvF83Qx4QB8goBckDhiA1RKJ1wRHccZSCREGT9lZyGsAFAApwEbz5rtqKpb--ardhenUdlstl1r_ai27Wfj38M5O3H5OtiLwztkrw_Txf0smb88Pt3fzZNSpbJNlMi5c6Q4OYXOAmnINKlUE7gStZSkl-SoUFrwLHdalSXpooSC6yxdFoUYspt-79Y3H50NrdlUobTrdV7bpgsmgzQjiOEor3-VcaNE1PQPKFACwN8wxRSFwAjHP-Cq6Xwd72K0liIFKXlE2KPSNyF468zWV5vc7wyC2ddl9nWZfV3mUFfMXPWZylr7zfe_X9JLjWI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>884370442</pqid></control><display><type>article</type><title>Hop integrity in computer networks</title><source>IEEE Electronic Library (IEL)</source><creator>Gouda, M.G. ; Elnozahy, E.N. ; Chin-Tser Huang ; McGuire, T.M.</creator><creatorcontrib>Gouda, M.G. ; Elnozahy, E.N. ; Chin-Tser Huang ; McGuire, T.M.</creatorcontrib><description>A computer network is said to provide hop integrity if, when any router, p, in the network receives a message, m, supposedly from an adjacent router, q, then p can check that m was indeed sent by q, was not modified after it was sent and was not a replay of an old message sent from q to p. We describe three protocols that can be added to the routers in a computer network so that the network can provide hop integrity, and thus overcome most denial-of-service attacks. These three protocols are a secret exchange protocol, a weak integrity protocol and a strong integrity protocol. All three protocols are stateless, require small overhead and do not constrain the network protocol in the routers in any way.</description><identifier>ISSN: 1063-6692</identifier><identifier>EISSN: 1558-2566</identifier><identifier>DOI: 10.1109/TNET.2002.1012363</identifier><identifier>CODEN: IEANEP</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Access protocols ; Computer crime ; Computer networks ; Computer science education ; Educational programs ; Integrity ; Intelligent networks ; Internet ; IP networks ; Messages ; Networks ; Protocol (computers) ; Routers ; System software ; TCPIP</subject><ispartof>IEEE/ACM transactions on networking, 2002-06, Vol.10 (3), p.308-319</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2002</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c574t-53a2ff6526f51fe068098657860fc184468d6f6b58329af85cc68bc0b2897dbb3</citedby><cites>FETCH-LOGICAL-c574t-53a2ff6526f51fe068098657860fc184468d6f6b58329af85cc68bc0b2897dbb3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1012363$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27922,27923,54756</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1012363$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gouda, M.G.</creatorcontrib><creatorcontrib>Elnozahy, E.N.</creatorcontrib><creatorcontrib>Chin-Tser Huang</creatorcontrib><creatorcontrib>McGuire, T.M.</creatorcontrib><title>Hop integrity in computer networks</title><title>IEEE/ACM transactions on networking</title><addtitle>TNET</addtitle><description>A computer network is said to provide hop integrity if, when any router, p, in the network receives a message, m, supposedly from an adjacent router, q, then p can check that m was indeed sent by q, was not modified after it was sent and was not a replay of an old message sent from q to p. We describe three protocols that can be added to the routers in a computer network so that the network can provide hop integrity, and thus overcome most denial-of-service attacks. These three protocols are a secret exchange protocol, a weak integrity protocol and a strong integrity protocol. All three protocols are stateless, require small overhead and do not constrain the network protocol in the routers in any way.</description><subject>Access protocols</subject><subject>Computer crime</subject><subject>Computer networks</subject><subject>Computer science education</subject><subject>Educational programs</subject><subject>Integrity</subject><subject>Intelligent networks</subject><subject>Internet</subject><subject>IP networks</subject><subject>Messages</subject><subject>Networks</subject><subject>Protocol (computers)</subject><subject>Routers</subject><subject>System software</subject><subject>TCPIP</subject><issn>1063-6692</issn><issn>1558-2566</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2002</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNqN0T1PwzAQBmALgUQp_ADEUnWAKeXOHxdnRKhQpAqWMltJaqOUNil2ItR_j6t0QAzA5JP8vDfcy9glwgQRstvF83Qx4QB8goBckDhiA1RKJ1wRHccZSCREGT9lZyGsAFAApwEbz5rtqKpb--ardhenUdlstl1r_ai27Wfj38M5O3H5OtiLwztkrw_Txf0smb88Pt3fzZNSpbJNlMi5c6Q4OYXOAmnINKlUE7gStZSkl-SoUFrwLHdalSXpooSC6yxdFoUYspt-79Y3H50NrdlUobTrdV7bpgsmgzQjiOEor3-VcaNE1PQPKFACwN8wxRSFwAjHP-Cq6Xwd72K0liIFKXlE2KPSNyF468zWV5vc7wyC2ddl9nWZfV3mUFfMXPWZylr7zfe_X9JLjWI</recordid><startdate>20020601</startdate><enddate>20020601</enddate><creator>Gouda, M.G.</creator><creator>Elnozahy, E.N.</creator><creator>Chin-Tser Huang</creator><creator>McGuire, T.M.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20020601</creationdate><title>Hop integrity in computer networks</title><author>Gouda, M.G. ; Elnozahy, E.N. ; Chin-Tser Huang ; McGuire, T.M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c574t-53a2ff6526f51fe068098657860fc184468d6f6b58329af85cc68bc0b2897dbb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2002</creationdate><topic>Access protocols</topic><topic>Computer crime</topic><topic>Computer networks</topic><topic>Computer science education</topic><topic>Educational programs</topic><topic>Integrity</topic><topic>Intelligent networks</topic><topic>Internet</topic><topic>IP networks</topic><topic>Messages</topic><topic>Networks</topic><topic>Protocol (computers)</topic><topic>Routers</topic><topic>System software</topic><topic>TCPIP</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gouda, M.G.</creatorcontrib><creatorcontrib>Elnozahy, E.N.</creatorcontrib><creatorcontrib>Chin-Tser Huang</creatorcontrib><creatorcontrib>McGuire, T.M.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE/ACM transactions on networking</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gouda, M.G.</au><au>Elnozahy, E.N.</au><au>Chin-Tser Huang</au><au>McGuire, T.M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Hop integrity in computer networks</atitle><jtitle>IEEE/ACM transactions on networking</jtitle><stitle>TNET</stitle><date>2002-06-01</date><risdate>2002</risdate><volume>10</volume><issue>3</issue><spage>308</spage><epage>319</epage><pages>308-319</pages><issn>1063-6692</issn><eissn>1558-2566</eissn><coden>IEANEP</coden><abstract>A computer network is said to provide hop integrity if, when any router, p, in the network receives a message, m, supposedly from an adjacent router, q, then p can check that m was indeed sent by q, was not modified after it was sent and was not a replay of an old message sent from q to p. We describe three protocols that can be added to the routers in a computer network so that the network can provide hop integrity, and thus overcome most denial-of-service attacks. These three protocols are a secret exchange protocol, a weak integrity protocol and a strong integrity protocol. All three protocols are stateless, require small overhead and do not constrain the network protocol in the routers in any way.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNET.2002.1012363</doi><tpages>12</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1063-6692
ispartof IEEE/ACM transactions on networking, 2002-06, Vol.10 (3), p.308-319
issn 1063-6692
1558-2566
language eng
recordid cdi_proquest_miscellaneous_907960329
source IEEE Electronic Library (IEL)
subjects Access protocols
Computer crime
Computer networks
Computer science education
Educational programs
Integrity
Intelligent networks
Internet
IP networks
Messages
Networks
Protocol (computers)
Routers
System software
TCPIP
title Hop integrity in computer networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T06%3A21%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Hop%20integrity%20in%20computer%20networks&rft.jtitle=IEEE/ACM%20transactions%20on%20networking&rft.au=Gouda,%20M.G.&rft.date=2002-06-01&rft.volume=10&rft.issue=3&rft.spage=308&rft.epage=319&rft.pages=308-319&rft.issn=1063-6692&rft.eissn=1558-2566&rft.coden=IEANEP&rft_id=info:doi/10.1109/TNET.2002.1012363&rft_dat=%3Cproquest_RIE%3E907960329%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=884370442&rft_id=info:pmid/&rft_ieee_id=1012363&rfr_iscdi=true