Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Secure and Policy-Compliant Source Routing--- NETWORKING
Post: #1

Secure and Policy-Compliant Source Routing--- NETWORKING

Abstract”In today™s Internet, inter-domain route control remains elusive; nevertheless, such control could improve the performance, reliability, and utility of the network for end users and ISPs alike. While researchers have proposed a number of source routing techniques to combat this limitation, there has thus far been no way for independent ASes to ensure that such traffic does not circumvent local traffic policies, nor to accurately determine the correct party to charge for forwarding the traffic.

We present Platypus, an authenticated source routing system built around the concept of network capabilities, which allow for accountable, fine-grained path selection by cryptographically attesting to policy compliance at each hop along a source route. Capabilities can be composed to construct routes through multiple ASes and can be delegated to third parties. Platypus caters to the needs of both end users and ISPs: users gain the ability to pool their resources and select routes other than the default, while ISPs maintain control over where, when, and whose packets traverse their networks. We describe the design and implementation of an extensive Platypus policy framework that can be used to address several issues in wide-area routing at both the edge and the core, and evaluate its performance and security. Our results show that incremental deployment of Platypus can achieve immediate gains.

Technology to use:DOT NET
Post: #2
Hi i need a system testing which should be used in secure & policy compliant source routing...
Post: #3
more details in this thread:

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: selinux policy howto, secure and policy compliant source routing documentation, quality policy of sona koyo, secure and policy compliant source routing pdf, secure and policy compliant source routing ppt, aomdv routing protocol in networking ppt, source based routing,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 1,996 26-05-2015 03:04 PM
Last Post: seminar report asees
  Fault Secure Encoder and Decoder For NanoMemory Applications computer girl 2 2,069 25-02-2015 07:17 AM
Last Post: Guest
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 3,574 27-01-2015 12:09 AM
Last Post: Guest
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 2,576 10-01-2015 11:13 PM
Last Post: Guest
  Visa Processing System full report and asp source code project topics 2 4,492 19-06-2014 06:54 PM
Last Post: seminar report asees
  Secure Multipart File Transfer projectsofme 4 3,079 07-03-2013 05:16 PM
Last Post: Guest
  distributed cache updating for the dynamic source routing protocol project report tiger 4 2,470 05-03-2013 02:22 PM
Last Post: Guest
  Conditional Shortest Path Routing in Delay Tolerant Networks seminar class 5 2,954 18-01-2013 03:06 PM
Last Post: Guest
  CAR: Context-Aware Adaptive Routing for Delay-Tolerant Mobile Networks project topics 2 2,123 02-01-2013 10:25 AM
Last Post: seminar details
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 2 1,473 22-11-2012 01:26 PM
Last Post: seminar details