Securing the Control-plane Channel and Cache of Pull-based ID/LOC Protocols

نویسندگان

  • Paul Almasan
  • Jordi Paillisse
  • Alberto Rodriguez-Natal
  • Pere Barlet-Ros
  • Florin Coras
  • Vina Ermagan
  • Fabio Maino
  • Albert Cabellos-Aparicio
چکیده

Pull-based ID/LOC split protocols, such as LISP (RFC6830), retrieve mappings from a mapping system to encapsulate and forward packets. This is done by means of a control-plane channel. In this short paper we describe three attacks against this channel (Denial-of-Service and overflowing) as well as the against the local cache used to store such mappings. We also provide a solution against such attacks that implements a per-source rate-limiter using a Count-Min Sketch data-structure.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Application of SVC on Large Synchronous Motors Based on LOC Design (RESEARCH NOTE)

This paper describes the application of static var compensators, (SVC) on an electrical distribution network containing two large synchronous motors, one of which is excited via a three-phase thyristor bridge rectifier. The second machine is excited via a diode bridge rectifier. Based on linear optimization control (LOC), the measurable feedback signals are applied to the control system loops o...

متن کامل

Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

متن کامل

Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018