Title :
Hop integrity in computer networks
Author :
Gouda, M.G. ; Elnozahy, E.N. ; Huang, C.-T. ; McGuire, T.M.
Author_Institution :
Dept. of Comput. Sci., Texas Univ., Austin, TX, USA
Abstract :
A computer network is said to provide hop integrity iff when any router p in the network receives a message m supposedly from an adjacent router q, then p can check that m was indeed sent by q, was not modified after it was sent, and was not a replay of an old message sent from q to p. We describe three protocols that can be added to the routers in a computer network so that the network can provide hop integrity. These three protocols are a secret exchange protocol, a weak integrity protocol, and a strong integrity protocol. All three protocols are stateless, require small overhead, and do not constrain the network protocol in the routers in any way
Keywords :
computer networks; security of data; telecommunication network routing; telecommunication security; transport protocols; Internet Protocol; TCP/IP; Transmission Control Protocol; computer networks; hop integrity; message transmission; network protocol; network security; protocols; router; secret exchange protocol; stateless protocol; strong integrity protocol; weak integrity protocol; Access protocols; Computer networks; Computer science education; Computer security; Educational programs; IP networks; Intelligent networks; TCPIP;
Conference_Titel :
Network Protocols, 2000. Proceedings. 2000 International Conference on
Conference_Location :
Osaka
Print_ISBN :
0-7695-0921-5
DOI :
10.1109/ICNP.2000.896287