Filters








768 Hits in 2.3 sec

Secure anycast routing in wireless mesh networks
English

* Fazl-e-Hadi, Ali Minhas Abid, Almazyad Abdulaziz, Naseer Atif
2014 Scientific Research and Essays  
It has redundant links to provide reliable communication. Anycast is an important service for the group communication. Field based routing is getting popularity due to its robustness and simplicity.  ...  In this paper, we have studies on the security issues for the anycast service based upon the field based routing.  ...  Various nodes perform two way communications to facilitate the reliable communication.  ... 
doi:10.5897/sre11.970 fatcat:52kacov7uzcfxpypuiwechpj2e

Approach towards Realizing the Security Threats for Mobile IPv6 and Solution Thereof

Amrit Ghosh, Prasun Chakrabarti, Pierluigi Siano
2014 International Journal of Computer Applications  
This paper entails an algorithm that contains all security components viz. authentication of services, confidentiality and integrity of data packets during communication, secrecy of key management and  ...  thus it would be able to nullify all types of security threats in Mobile IPv6 in anycast environment.  ...  Then the MN would communicate a secured register binding update message (i.e. RBU) through an authenticated and secured care-of-address (i.e.  ... 
doi:10.5120/15758-4417 fatcat:xnu3e4l4dzbk7amc3u3eghmkpy

Efficient algorithm for mobile multicast using anycast group

W. Jia, W. Zhou, J. Kaiser
2001 IEE Proceedings - Communications  
Mobile hosts use anycast tunnelling to connect to the nearest available homeiforeign agent where an agent is able to forward the multicast messages by selecting an anycast route to a multicast router so  ...  The authors present a novel and efficient multicast algorithm that aims to reduce delay and communication cost for the registration between mobile nodes and mobility agents and solicitation for foreign  ...  Our protocol defines that the agents in the same anycast group GA will share the same authentication for mobile node registrations, i.e.  ... 
doi:10.1049/ip-com:20010211 fatcat:mtal7q7nvngxne3kjzpdcq7mru

The Dynamics of A Self-Forming Network [article]

Igor Sobrado, Dave Uhring
2006 arXiv   pre-print
Selective anycasting is an extension to the anycast addressing model that supports exclusion of members of groups that perform poorly or inappropriately on a per-host basis.  ...  Among others, we suggest a technique called adaptive routing that provides secure intelligent routing capabilities to computer communication networks.  ...  Forté, the founder of Forté Computer Systems Inc., for providing us with the networking infrastructure required to perform this research.  ... 
arXiv:cs/0608041v1 fatcat:rvrzwdhpjrbxhj55p5x43dsowy

IPv6 anycast for simple and effective service-oriented communications

S. Doi, S. Ata, H. Kitamura, M. Murata
2004 IEEE Communications Magazine  
Although anycast communication supports serviceoriented addresses, many of its current definitions in IPv6 are unclear.  ...  In this paper, we first review IPv6-based anycast communication. At present, there are several possible applications that are suited to this.  ...  Thus, some authentication mechanism is necessary to actually validate anycasting.  ... 
doi:10.1109/mcom.2004.1299362 fatcat:2mzgxnoquzb3bg7ctlz53qyxj4

Enhancing network security education with research and development content

Mostafa Bassiouni, Ratan Guha
2011 Proceedings of the 2011 conference on Information technology education - SIGITE '11  
Through our research and graduate teaching, we identified important security aspects of the anycast technology that are overlooked by traditional textbooks on network security.  ...  We added content on anycast to give the undergraduate students better experience with emerging security applications.  ...  The Role of IPSec Protocol In order to minimize the risk of BGP man-in-the-middle attack, secure file transfer methods and strong authentication should be used for all BGP transfers.  ... 
doi:10.1145/2047594.2047669 dblp:conf/sigite/BassiouniG11 fatcat:57j24ousxzeutefo2kmra5z5yy

Global-Scale Anycast Network Management with Verfploeter

Wouter B. de Vries, Salman Aljammaz, Roland van Rijswijk-Deij
2020 NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium  
To manage an anycast service, it is vital to know the catchment of points of presence (PoPs) of the service.  ...  We demonstrated the efficacy of Verfploeter on a testbed and small anycast service.  ...  Secure communication: Transport Layer Security (TLS) is used throughout the system for communication, to meet R4, in combination with gRPC [15] .  ... 
doi:10.1109/noms47738.2020.9110449 dblp:conf/noms/VriesAR20 fatcat:zuhbc5yrbbayphcg5liyaqbv2a

Hindering Eavesdropping via IPv6 Opportunistic Encryption [chapter]

Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann
2004 Lecture Notes in Computer Science  
The IPsec gateways are discovered using IPv6 anycast, and they derive authorization from authorization certificates and Crypto-Based Identifiers (CBIDs).  ...  This paper presents an opportunistic encryption scheme strictly layered on top of IPv6.  ...  It allows secure (encrypted, authenticated) communication without connection-by-connection pairwise pre-arrangement.  ... 
doi:10.1007/978-3-540-30108-0_19 fatcat:2x7akdw2g5chbnnjwgghndeyjq

Enabling service adaptability with versatile anycast

Michal Szymaniak, Guillaume Pierre, Mariana Simons-Nikolova, Maarten van Steen
2007 Concurrency and Computation  
At the same time, our anycast implementation does not incur any significant communication overhead compared to unicast communication.  ...  Finally, efficient anycasting should not introduce significant overhead compared to unicast communication.  ...  This comes close to the anycast communication model, in which traffic sent to the anycast address of an anycast group is routed to the interface of some node within that group.  ... 
doi:10.1002/cpe.1213 fatcat:7fx2bmswcvdsnarp4fen737uy4

Using SEND Signature Algorithm Agility and Multiple-Key CGA to Secure Proxy Neighbor Discovery and Anycast Addressing

Tony Cheneau, Maryline Laurent
2011 2011 Conference on Network and Information Systems Security  
Using SEND signature algorithm agility and multiple-key CGA to secure proxy neighbor discovery and anycast addressing.  ...  ACKNOWLEDGMENT This research is part of the TLCOM MobiSEND project financed by the French National Research Agency (ANR). Tony Cheneau is supported by a grant of TELECOM SudParis.  ...  This procedure enables hosts to verify the authenticity of the neighboring routers and thus their RA messages.  ... 
doi:10.1109/sar-ssi.2011.5931376 fatcat:r5thqrezfvhibo4fu4y7ba2tga

Considerations and Open Issues in Delay Tolerant Network'S (DTNs) Security

Harminder Singh Bindra, Amrit Lal Sangal
2010 Wireless Sensor Network  
Delay Tolerant Network (DTN) addresses challenges of providing end-to-end service where end-to-end data forwarding paths may not exist.  ...  Security and privacy are crucial to the wide deployments of DTN. Without security and privacy guarantees, people are reluctant to accept such a new network paradigm.  ...  of messages, but do not attempt to authenticate routers that forward information.  ... 
doi:10.4236/wsn.2010.28076 fatcat:npc46htapvhtxbxqnanuur2bwe

IP next generation overview

Robert M. Hinden
1996 Communications of the ACM  
Anycast addresses identify a set of interfaces such that a packet sent to a anycast address will be delivered to one member of the set.  ...  A new type of address called a "anycast address" is defined, to identify sets of nodes where a packet sent to an anycast address is delivered to one of the nodes.  ...  Hinden is Director of Software at Ipsilon Networks, Inc. of Mountain View , California. Ipsilon Networks is a startup working in the area of high performance internetworking and ATM. Mr.  ... 
doi:10.1145/228503.228517 fatcat:jaxvowjyezf45ajbm36535tf4m

On extending ESnet's OSCARS with a multi-domain anycast service

M. Boddie, T. Entel, C. Guok, A. Lake, J. Plante, E. Pouyoul, B. H. Ramaprasad, B. Tierney, J. Triay, V. M. Vokkarane
2012 2012 16th International Conference on Optical Network Design and Modelling (ONDM)  
This new means of communication allows for greater routing flexibility and better network resource consumption.  ...  In contrast to unicasting, anycast routing allows the selection of a node from a group of candidate destinations.  ...  Fig. 5 showcase the ability for anycast communication to efficiently manage resource utilization on the ESnet.  ... 
doi:10.1109/ondm.2012.6210279 dblp:conf/ondm/BoddieEGLPPRTTV12 fatcat:tv7uyjwec5bfxbjwq6sgwgspdm

Towards a global IP anycast service

Hitesh Ballani, Paul Francis
2005 Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '05  
PIAS makes use of a proxy overlay that advertises IP anycast addresses on behalf of group members and tunnels anycast packets to those members.  ...  The primary contribution of this paper is a new IP anycast architecture, PIAS, that overcomes these problems while largely maintaining the strengths of IP anycast.  ...  Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the agencies above.  ... 
doi:10.1145/1080091.1080127 dblp:conf/sigcomm/BallaniF05 fatcat:yafdhlekfvbzhd6w4tekwskjle

Towards a global IP anycast service

Hitesh Ballani, Paul Francis
2005 Computer communication review  
PIAS makes use of a proxy overlay that advertises IP anycast addresses on behalf of group members and tunnels anycast packets to those members.  ...  The primary contribution of this paper is a new IP anycast architecture, PIAS, that overcomes these problems while largely maintaining the strengths of IP anycast.  ...  Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the agencies above.  ... 
doi:10.1145/1090191.1080127 fatcat:2pktnzf5s5e2tmdqstp5w3wena
« Previous Showing results 1 — 15 out of 768 results