TRUST:Team for Research in Ubiquitous Secure Technologies Security Protocols for the Internet and Sensor Networks Adrian Perrig Carnegie Mellon University NSF STC Review September 6, 2004
SPV: Secure Path Vector Routing Securing BGP routing is a priority SPV uses efficient one-way functions to secure ASNs in BGP ASPATHs [Sigcomm 2004] Key insight: no need for AS authentication to prevent worst attacks Excellent incremental deployment properties Collaboration with Yih-Chun Hu @ UC Berkeley c3 c4 A A, B c2 c1 NSF STC Review December 8, 2018
DDoS Attack Defense Link flooding is a serious challenge Fundamental Internet limitation: receiver cannot control flows, anybody can flood traffic Collaboration with Ion Stoica @ UC Berkeley Use I3 for receiver-controlled flows [Hotnets 2003] SIFF: Stateless Internet Flow Filter [IEEE S&P 2004] No per-flow state on routers Enables receiver to terminate flows inside network Excellent incremental deployment properties Based on network capabilities that routers insert and verify NSF STC Review December 8, 2018
Projects to Secure Sensor Networks Basic security building blocks Secure key distribution Secure node-to-node and broadcast communication Secure routing Secure information aggregation External verification of memory contents Secure location determination Use building blocks to construct secure, attack-resilient sensor network NSF STC Review December 8, 2018