Secure and Policy-Compliant Source Routing--- NETWORKING
#1

Secure and Policy-Compliant Source Routing--- NETWORKING

Abstract”In today™s Internet, inter-domain route control remains elusive; nevertheless, such control could improve the performance, reliability, and utility of the network for end users and ISPs alike. While researchers have proposed a number of source routing techniques to combat this limitation, there has thus far been no way for independent ASes to ensure that such traffic does not circumvent local traffic policies, nor to accurately determine the correct party to charge for forwarding the traffic.

We present Platypus, an authenticated source routing system built around the concept of network capabilities, which allow for accountable, fine-grained path selection by cryptographically attesting to policy compliance at each hop along a source route. Capabilities can be composed to construct routes through multiple ASes and can be delegated to third parties. Platypus caters to the needs of both end users and ISPs: users gain the ability to pool their resources and select routes other than the default, while ISPs maintain control over where, when, and whose packets traverse their networks. We describe the design and implementation of an extensive Platypus policy framework that can be used to address several issues in wide-area routing at both the edge and the core, and evaluate its performance and security. Our results show that incremental deployment of Platypus can achieve immediate gains.


Technology to useBig GrinOT NET
Reply
#2
Hi i need a system testing which should be used in secure & policy compliant source routing...
Reply
#3

more details in this thread:
http://studentbank.in/report-secure-and-...ce-routing
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: source routing bridge, detecting firewall policy in java with source code, powered by mybb social networking policy, literature survey secure and policy complient source routing, hr policy of tata indicom, mp online transffer policy, internet protocol version 6 compliant,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,568 17-10-2017, 02:48 PM
Last Post: jaseela123d
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,056 15-02-2017, 03:40 PM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 905 14-02-2017, 03:49 PM
Last Post: jaseela123d
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 2,964 26-05-2015, 03:04 PM
Last Post: seminar report asees
  Fault Secure Encoder and Decoder For NanoMemory Applications computer girl 2 2,925 25-02-2015, 07:17 AM
Last Post: Guest
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 4,700 27-01-2015, 12:09 AM
Last Post: Guest
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 3,544 10-01-2015, 11:13 PM
Last Post: Guest
  Visa Processing System full report and asp source code project topics 2 5,520 19-06-2014, 06:54 PM
Last Post: seminar report asees
  Secure Multipart File Transfer projectsofme 4 3,756 07-03-2013, 05:16 PM
Last Post: Guest
  distributed cache updating for the dynamic source routing protocol project report tiger 4 3,000 05-03-2013, 02:22 PM
Last Post: Guest

Forum Jump: