首页> 外文期刊>Computer Communications >Blind Packet Forwarding in a Hierarchical Level-based Locator/Identifier Split
【24h】

Blind Packet Forwarding in a Hierarchical Level-based Locator/Identifier Split

机译:基于分层级别的定位器/标识符拆分中的盲目数据包转发

获取原文
获取原文并翻译 | 示例
           

摘要

Network Address Confidentiality (NAC) classifies all network nodes as adversaries and limits access to the network packet addresses in cleartext exclusively to the communicating endpoints. In our model, an adversary can control a single network node as well as a part or all of the network nodes on the route of a packet. Moreover, an adversary can observe and exploit network packet addresses. NAC implies certain anonymity properties, namely sender/recipient and relationship unlinkabilities. In contrast to the existing approaches related to NAC and its unlinkability properties with regard to our strong adversary model, Blind Packet Forwarding (BPF) tackles this issue in a clean-slate manner by redesigning the packet forwarding and its associated services to blind ones transferring and processing packet addresses in end-to-end encrypted form. This paper proposes a BPF architecture combining two approaches being based on the Locator/Identifier Split principle for a future network architecture. This BPF design introduces a fine-grained, flexible and dynamic blindness providing multiple NAC and unlinkability levels classified into two blindness taxonomies. In the first taxonomy, the higher the masking rank being applied to an address, the bigger is the radius of network domains within which NAC applies to the address, beginning with the top-level network domain. By applying higher masking ranks in the second blindness taxonomy, an endpoint can mask its address within higher network domains in direction of the top-level network domain. This paper also adapts OpenFlow in order to achieve a BPF implementation which provides high performance and can thus support multiple real-time media communications each with a high sending rate.
机译:网络地址机密性(NAC)将所有网络节点分类为对手,并限制在ClearText中的访问,专门用于通信端点。在我们的模型中,对手可以控制单个网络节点以及数据包路径上的网络节点或全部网络节点。此外,对手可以观察和利用网络数据包地址。 NAC意味着某些匿名属性,即发件人/收件人和关系不可分辨率。与与NAC相关的现有方法以及关于我们强大的对手模型相关的方法相比,盲目数据包转发(BPF)通过将数据包转发及其相关的服务重新设计到盲目的转移和转移的相关服务来解决这个问题处理端到端加密表单中的数据包地址。本文提出了一种基于用于未来网络架构的定位器/标识符的分割原理的两种方法的BPF架构。该BPF设计介绍了一种细粒度,灵活,动态的失明,提供多种NAC和分类为两个失明分类的不良水平。在第一个分类学中,屏蔽等级越高,应用于地址,较大的是NAC在地址中的网络域中的半径,从顶级网络域开始。通过在第二个失明分类中应用更高的掩蔽等级,端点可以在高级网络域的方向上掩盖其在高网络域内的地址。本文还适应了OpenFlow,以实现提供高性能的BPF实现,因此可以支持具有高发送速率的多个实时媒体通信。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号