Proceedings of the ACM SIGCOMM '97 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communic 1997
DOI: 10.1145/263105.263170
|View full text |Cite
|
Sign up to set email alerts
|

A flow-based approach to datagram security

Abstract: Datagram services provide a simple, flexible, robust, and scalable communication abstraction; their usefulness has been well demonstrated by the success of IP, UDP, and RPC. Yet, the overwhelming majority of network security protocols that have been proposed are geared towards connection-oriented communications.The few that do cater to datagram communications tend to either rely on long term host-pair keying or impose a session-oriented (Le., requiring connection setup) semantics. Separately, the concept of fl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

1999
1999
2003
2003

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…1 Most investigations on securing data delivery over packet networks have focused on unicast delivery of data sent as independent packets. Exceptions include recent papers on scalable secure multicasting [1,13,20] and a flowbased approach to datagram security [14]. All of these papers are mainly concerned with data confidentiality.…”
Section: Introductionmentioning
confidence: 99%
“…1 Most investigations on securing data delivery over packet networks have focused on unicast delivery of data sent as independent packets. Exceptions include recent papers on scalable secure multicasting [1,13,20] and a flowbased approach to datagram security [14]. All of these papers are mainly concerned with data confidentiality.…”
Section: Introductionmentioning
confidence: 99%
“…The crux of this idea is to use flows as the basis for signatures. A flow can be defined as a sequence of datagrams satisfying some pre-defined attributes [18]. A flow is neither a datagram nor a connection-based method; instead, it combines the best of both ideas.…”
Section: Flow-based Approachmentioning
confidence: 99%
“…It will be appended to the signature packet for receivers to know which signatures to use for verification, and inside the signature to verify the ID tag has not been modified. Figures 17,18, and 19 compared the eFFS method with this modified MeFFS method for the same networks of 25, 100, and 250 nodes as the above figures. As can be seen in the figures, this modified method is more efficient than the eFFS method in many experiments.…”
Section: • Effsmentioning
confidence: 99%