2021
DOI: 10.1109/jiot.2020.3048842
|View full text |Cite
|
Sign up to set email alerts
|

Softwarized IoT Network Immunity Against Eavesdropping With Programmable Data Planes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 48 publications
0
9
0
Order By: Relevance
“…Same ideas are applied to P4-MACsec by the same authors. Other works that rely on externs include [193,194].…”
Section: ) Cryptography Schemes Comparison Discussion and Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Same ideas are applied to P4-MACsec by the same authors. Other works that rely on externs include [193,194].…”
Section: ) Cryptography Schemes Comparison Discussion and Limitationsmentioning
confidence: 99%
“…The goal of this work is to avoid coding cryptographic functions on hardware (VHDL), and thus enables rapid prototyping of in-network applications with security functions. Another work that relies on externs for cryptographic functions is P4NIS [194].…”
Section: ) External Cryptographymentioning
confidence: 99%
“…However, this encryption mechanism still imposes high computational costs in the data plane, due to the interaction process including multiple key agreements between nodes. Liu et al [17] proposed a P4based network immune scheme (P4NIS) against the eavesdropping attacks, which is equipped with three lines of defenses. In the third line, the scheme encrypts all packet payloads in the application layer using traditional cryptographic mechanisms.…”
Section: P4-basedmentioning
confidence: 99%
“…Cao et al [ 6 ] proposed an improved identity-based encryption algorithm that lies between the traditional public-key encryption and identity-based public tweezers’ encryption, effectively simplifying the key generation process. In [ 7 ], the scheme first forwards all traffic packets in a disordered manner, using different network paths and protocols, and then distributes the traffic packets from one stream to another based on different encryption schemes. Usually, these schemes that rely on traditional encryptions to secure data confidentiality still face the computational burden of encryption and decryption.…”
Section: Introductionmentioning
confidence: 99%