IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 2017
DOI: 10.1109/infocom.2017.8057011
|View full text |Cite
|
Sign up to set email alerts
|

Securing multipath TCP: Design & implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…To offer reliable cloud services, there is a need of an effective management of failures. Literature [14][15][16][17][18][19][20] reported that various failure management techniques and policies have been proposed for reliability assurance in cloud computing. A failure is defined as "when a cloud computing system fails to perform a specific function according to its predefined conditions".…”
Section: Failure Managementmentioning
confidence: 99%
“…To offer reliable cloud services, there is a need of an effective management of failures. Literature [14][15][16][17][18][19][20] reported that various failure management techniques and policies have been proposed for reliability assurance in cloud computing. A failure is defined as "when a cloud computing system fails to perform a specific function according to its predefined conditions".…”
Section: Failure Managementmentioning
confidence: 99%
“…Noh et al [40] designed a secure and lightweight subflow establishment mechanism for MPTCP, by utilizing a digital signature strategy to prevent the persistent ADD_ADDR attack. Jadin et al [41] designed a secure MPTCP variant by closely integrating authentication and encryption inside the MPTCP protocol. Nguyen et al [42] investigated the Autonomous System (AS)-level Man-in-the-Middle (MITM) attacks acting at the robustness of MPTCP communications, reported which countries and regions had a high-level of robustness against the MITM attacks by studying the AS level graph, and provided a countermeasure in preventing MPTCP from the AS-level MITM attacks when concurrently using multiple Internet-scale paths for multipath communications.…”
Section: F Mptcp Security Casesmentioning
confidence: 99%
“…One of these methods are based upon asymmetric routing and is characterized by the advantage of enhancing the time-sensitive application performance [42]. Another method is based on using security mechanisms and is found beneficial in data multiplexing and security [43]. In [44] the usage of data multiplexing as a redundant flow transmission has resulted in improving the application data integrity.…”
Section: Related Workmentioning
confidence: 99%