Hop integrity in computer networks
A computer network is said to provide hop integrity if, when any router, p, in the network receives a message, m, supposedly from an adjacent router, q, then p can check that m was indeed sent by q, was not modified after it was sent and was not a replay of an old message sent from q to p. We descri...
Gespeichert in:
Veröffentlicht in: | IEEE/ACM transactions on networking 2002-06, Vol.10 (3), p.308-319 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 319 |
---|---|
container_issue | 3 |
container_start_page | 308 |
container_title | IEEE/ACM transactions on networking |
container_volume | 10 |
creator | Gouda, M.G. Elnozahy, E.N. Chin-Tser Huang McGuire, T.M. |
description | A computer network is said to provide hop integrity if, when any router, p, in the network receives a message, m, supposedly from an adjacent router, q, then p can check that m was indeed sent by q, was not modified after it was sent and was not a replay of an old message sent from q to p. We describe three protocols that can be added to the routers in a computer network so that the network can provide hop integrity, and thus overcome most denial-of-service attacks. These three protocols are a secret exchange protocol, a weak integrity protocol and a strong integrity protocol. All three protocols are stateless, require small overhead and do not constrain the network protocol in the routers in any way. |
doi_str_mv | 10.1109/TNET.2002.1012363 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_miscellaneous_907960329</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1012363</ieee_id><sourcerecordid>907960329</sourcerecordid><originalsourceid>FETCH-LOGICAL-c574t-53a2ff6526f51fe068098657860fc184468d6f6b58329af85cc68bc0b2897dbb3</originalsourceid><addsrcrecordid>eNqN0T1PwzAQBmALgUQp_ADEUnWAKeXOHxdnRKhQpAqWMltJaqOUNil2ItR_j6t0QAzA5JP8vDfcy9glwgQRstvF83Qx4QB8goBckDhiA1RKJ1wRHccZSCREGT9lZyGsAFAApwEbz5rtqKpb--ardhenUdlstl1r_ai27Wfj38M5O3H5OtiLwztkrw_Txf0smb88Pt3fzZNSpbJNlMi5c6Q4OYXOAmnINKlUE7gStZSkl-SoUFrwLHdalSXpooSC6yxdFoUYspt-79Y3H50NrdlUobTrdV7bpgsmgzQjiOEor3-VcaNE1PQPKFACwN8wxRSFwAjHP-Cq6Xwd72K0liIFKXlE2KPSNyF468zWV5vc7wyC2ddl9nWZfV3mUFfMXPWZylr7zfe_X9JLjWI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>884370442</pqid></control><display><type>article</type><title>Hop integrity in computer networks</title><source>IEEE Electronic Library (IEL)</source><creator>Gouda, M.G. ; Elnozahy, E.N. ; Chin-Tser Huang ; McGuire, T.M.</creator><creatorcontrib>Gouda, M.G. ; Elnozahy, E.N. ; Chin-Tser Huang ; McGuire, T.M.</creatorcontrib><description>A computer network is said to provide hop integrity if, when any router, p, in the network receives a message, m, supposedly from an adjacent router, q, then p can check that m was indeed sent by q, was not modified after it was sent and was not a replay of an old message sent from q to p. We describe three protocols that can be added to the routers in a computer network so that the network can provide hop integrity, and thus overcome most denial-of-service attacks. These three protocols are a secret exchange protocol, a weak integrity protocol and a strong integrity protocol. All three protocols are stateless, require small overhead and do not constrain the network protocol in the routers in any way.</description><identifier>ISSN: 1063-6692</identifier><identifier>EISSN: 1558-2566</identifier><identifier>DOI: 10.1109/TNET.2002.1012363</identifier><identifier>CODEN: IEANEP</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Access protocols ; Computer crime ; Computer networks ; Computer science education ; Educational programs ; Integrity ; Intelligent networks ; Internet ; IP networks ; Messages ; Networks ; Protocol (computers) ; Routers ; System software ; TCPIP</subject><ispartof>IEEE/ACM transactions on networking, 2002-06, Vol.10 (3), p.308-319</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2002</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c574t-53a2ff6526f51fe068098657860fc184468d6f6b58329af85cc68bc0b2897dbb3</citedby><cites>FETCH-LOGICAL-c574t-53a2ff6526f51fe068098657860fc184468d6f6b58329af85cc68bc0b2897dbb3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1012363$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27922,27923,54756</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1012363$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gouda, M.G.</creatorcontrib><creatorcontrib>Elnozahy, E.N.</creatorcontrib><creatorcontrib>Chin-Tser Huang</creatorcontrib><creatorcontrib>McGuire, T.M.</creatorcontrib><title>Hop integrity in computer networks</title><title>IEEE/ACM transactions on networking</title><addtitle>TNET</addtitle><description>A computer network is said to provide hop integrity if, when any router, p, in the network receives a message, m, supposedly from an adjacent router, q, then p can check that m was indeed sent by q, was not modified after it was sent and was not a replay of an old message sent from q to p. We describe three protocols that can be added to the routers in a computer network so that the network can provide hop integrity, and thus overcome most denial-of-service attacks. These three protocols are a secret exchange protocol, a weak integrity protocol and a strong integrity protocol. All three protocols are stateless, require small overhead and do not constrain the network protocol in the routers in any way.</description><subject>Access protocols</subject><subject>Computer crime</subject><subject>Computer networks</subject><subject>Computer science education</subject><subject>Educational programs</subject><subject>Integrity</subject><subject>Intelligent networks</subject><subject>Internet</subject><subject>IP networks</subject><subject>Messages</subject><subject>Networks</subject><subject>Protocol (computers)</subject><subject>Routers</subject><subject>System software</subject><subject>TCPIP</subject><issn>1063-6692</issn><issn>1558-2566</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2002</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNqN0T1PwzAQBmALgUQp_ADEUnWAKeXOHxdnRKhQpAqWMltJaqOUNil2ItR_j6t0QAzA5JP8vDfcy9glwgQRstvF83Qx4QB8goBckDhiA1RKJ1wRHccZSCREGT9lZyGsAFAApwEbz5rtqKpb--ardhenUdlstl1r_ai27Wfj38M5O3H5OtiLwztkrw_Txf0smb88Pt3fzZNSpbJNlMi5c6Q4OYXOAmnINKlUE7gStZSkl-SoUFrwLHdalSXpooSC6yxdFoUYspt-79Y3H50NrdlUobTrdV7bpgsmgzQjiOEor3-VcaNE1PQPKFACwN8wxRSFwAjHP-Cq6Xwd72K0liIFKXlE2KPSNyF468zWV5vc7wyC2ddl9nWZfV3mUFfMXPWZylr7zfe_X9JLjWI</recordid><startdate>20020601</startdate><enddate>20020601</enddate><creator>Gouda, M.G.</creator><creator>Elnozahy, E.N.</creator><creator>Chin-Tser Huang</creator><creator>McGuire, T.M.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20020601</creationdate><title>Hop integrity in computer networks</title><author>Gouda, M.G. ; Elnozahy, E.N. ; Chin-Tser Huang ; McGuire, T.M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c574t-53a2ff6526f51fe068098657860fc184468d6f6b58329af85cc68bc0b2897dbb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2002</creationdate><topic>Access protocols</topic><topic>Computer crime</topic><topic>Computer networks</topic><topic>Computer science education</topic><topic>Educational programs</topic><topic>Integrity</topic><topic>Intelligent networks</topic><topic>Internet</topic><topic>IP networks</topic><topic>Messages</topic><topic>Networks</topic><topic>Protocol (computers)</topic><topic>Routers</topic><topic>System software</topic><topic>TCPIP</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gouda, M.G.</creatorcontrib><creatorcontrib>Elnozahy, E.N.</creatorcontrib><creatorcontrib>Chin-Tser Huang</creatorcontrib><creatorcontrib>McGuire, T.M.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE/ACM transactions on networking</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gouda, M.G.</au><au>Elnozahy, E.N.</au><au>Chin-Tser Huang</au><au>McGuire, T.M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Hop integrity in computer networks</atitle><jtitle>IEEE/ACM transactions on networking</jtitle><stitle>TNET</stitle><date>2002-06-01</date><risdate>2002</risdate><volume>10</volume><issue>3</issue><spage>308</spage><epage>319</epage><pages>308-319</pages><issn>1063-6692</issn><eissn>1558-2566</eissn><coden>IEANEP</coden><abstract>A computer network is said to provide hop integrity if, when any router, p, in the network receives a message, m, supposedly from an adjacent router, q, then p can check that m was indeed sent by q, was not modified after it was sent and was not a replay of an old message sent from q to p. We describe three protocols that can be added to the routers in a computer network so that the network can provide hop integrity, and thus overcome most denial-of-service attacks. These three protocols are a secret exchange protocol, a weak integrity protocol and a strong integrity protocol. All three protocols are stateless, require small overhead and do not constrain the network protocol in the routers in any way.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNET.2002.1012363</doi><tpages>12</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1063-6692 |
ispartof | IEEE/ACM transactions on networking, 2002-06, Vol.10 (3), p.308-319 |
issn | 1063-6692 1558-2566 |
language | eng |
recordid | cdi_proquest_miscellaneous_907960329 |
source | IEEE Electronic Library (IEL) |
subjects | Access protocols Computer crime Computer networks Computer science education Educational programs Integrity Intelligent networks Internet IP networks Messages Networks Protocol (computers) Routers System software TCPIP |
title | Hop integrity in computer networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T06%3A21%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Hop%20integrity%20in%20computer%20networks&rft.jtitle=IEEE/ACM%20transactions%20on%20networking&rft.au=Gouda,%20M.G.&rft.date=2002-06-01&rft.volume=10&rft.issue=3&rft.spage=308&rft.epage=319&rft.pages=308-319&rft.issn=1063-6692&rft.eissn=1558-2566&rft.coden=IEANEP&rft_id=info:doi/10.1109/TNET.2002.1012363&rft_dat=%3Cproquest_RIE%3E907960329%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=884370442&rft_id=info:pmid/&rft_ieee_id=1012363&rfr_iscdi=true |