Download presentation
Presentation is loading. Please wait.
Published byΚλειώ Λύτρας Modified over 5 years ago
1
TRUST:Team for Research in Ubiquitous Secure Technologies
Security Protocols for the Internet and Sensor Networks Adrian Perrig Carnegie Mellon University NSF STC Review September 6, 2004
2
SPV: Secure Path Vector Routing
Securing BGP routing is a priority SPV uses efficient one-way functions to secure ASNs in BGP ASPATHs [Sigcomm 2004] Key insight: no need for AS authentication to prevent worst attacks Excellent incremental deployment properties Collaboration with Yih-Chun UC Berkeley c3 c4 A A, B c2 c1 NSF STC Review December 8, 2018
3
DDoS Attack Defense Link flooding is a serious challenge
Fundamental Internet limitation: receiver cannot control flows, anybody can flood traffic Collaboration with Ion UC Berkeley Use I3 for receiver-controlled flows [Hotnets 2003] SIFF: Stateless Internet Flow Filter [IEEE S&P 2004] No per-flow state on routers Enables receiver to terminate flows inside network Excellent incremental deployment properties Based on network capabilities that routers insert and verify NSF STC Review December 8, 2018
4
Projects to Secure Sensor Networks
Basic security building blocks Secure key distribution Secure node-to-node and broadcast communication Secure routing Secure information aggregation External verification of memory contents Secure location determination Use building blocks to construct secure, attack-resilient sensor network NSF STC Review December 8, 2018
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.