The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we analyze flow-based routing schemes in SDN. Specifically, we study the flow-based routing performance; combining the knowledge of the link condition and updating the period for calculating the path. The framework uses centralized control of SDN where the SDN controller calculates available paths to determine the routing policy based on a global knowledge network. This flow-based routing...
Named data networking (NDN) shifts today's host-centric Internet architecture to a new data-centric network architecture. This well suits the increasingly mobile and information-intensive applications that dominate today's Internet. NDN allows routers to cache named content, leading to a significant improvement of content retrieval which, however, opens a door for many new attacks. In this work, we...
IPv4 is the historical addressing protocol used for all devices connected worldwide. It has survived for over 30 years and has been an integral part of the Internet revolution. However, due to its limitation, IPv4 is being replacing by IPv6. Today, IPv6 is more and more widely used on the Internet. On the other hand, criminals are also well aware of the introduction of IPv6. They are continuously...
In situations where Internet connectivity is not available, opportunistic networks exploit the encounters between mobile human-carried devices for exchanging information. When people encounter each other, their handheld devices can communicate wirelessly and in a cooperative way using the encounter opportunities for forwarding their messages. However, in the real world, most of the nodes exhibit selfish...
A key aspect of realizing the future smart grid communication solution is a balanced approach between the network performance and the network security during the network deployment. A high security communication flow path is not useful when the network path cannot support capacity and reachability requirements. The deployment phase in communication network can facilitate an optimal network path by...
The Internet reserves numerous potential path diversity among densely connected autonomous systems (ASes). However, the Internet routing is controlled by Border Gateway Protocol (BGP), which has limitations in the path diversity expression and cooperation between ASes. The emergence of software defined networking (SDN) scheme provides flexible control over networks. In this paper, we leverage the...
Bundling the resources of different access links is a measure to improve throughput and resilience to network failure. This paper proposes a solution able to bundle the own DSL resources with available resources of neighbouring DSLs. The solution is based on links between the DSL routers (e.g. using Wi-Fi technology) which are used by the bundling algorithm to distribute data packets over the available...
A traditional approach to solving the large delay problem of campus networks is to upgrade the link connecting the gateway to the Internet. Inspired by the emerging content-centric network (CCN) and software defined network (SDN) architecture, we propose an alternative solution where the campus network uses a few CCN routers with caching ability, so that duplicate requests for the same content can...
Border Gateway Protocol (BGP) is the only routing protocol for the internet. This protocol suffers from unstable routes. Two major built-in mechanisms have been designed to work against the impact of these unstable routes. One of them is Route Flap Damping (RFD), which is designed to detect and suppress flapping or unstable routes. However, most operators have disabled RFD, which has been found to...
Border Gateway Protocol (BGP) is a widely used Internet routing protocol. While several security features have been introduced and implemented to prevent attacks and address routing instabilities, BGP remains vulnerable due to lack of integrity and authentication of BGP messages. BGP operations strongly depend on its security and attacks on BGP adversely influence packet routing. Given the importance...
Border Gateway Protocol (BGP), which enables Internet interconnectivity, is susceptible to various anomalous events that may affect the Internet performance. Understanding the nature of anomalous events (unintentional or malicious) and their effects helps classify future events and improve the Internet robustness. Determining the rate and causes of these anomalous events is important for assessing...
The decoupling of control and data plane in software-defined networking (SDN) has been shown to be promising to improve routing performance in the context of intradomain routing. The applicability of SDN in inter-domain routing, especially with respect to route convergence, has not been properly explored. In this work, we propose a mathematical model to quantify the BGP convergence time for inter-domain...
Data-plane fault localization enhances network availability and reliability by enabling localization and circumvention of malicious entities on a network path. Algorithms for data-plane fault localization exist for intra-domain settings, however, the per-flow or per-source state required at intermediate routers makes them prohibitively expensive in inter-domain settings. We present Faultprints, the...
After Internet routing was shown in a number of classic measurement papers to result in paths that are sub-optimal with respect to a number of metrics, routing overlays were proposed as a method for improving performance, without the need to re-engineer the underlying network. In this paper, we present SMART, a self-healing, self-optimizing and highly scalable routing overlay, which has a number of...
Recent advances in Cyber-Physical Systems (CPSs) promote the Internet as the main communication technology for monitoring, controlling and managing the physical entities as well as exchanging information between the physical entities and human users. On the other hand, the Internet introduces a variety of vulnerabilities that may put the security and privacy of CPSs under risk. The consequences of...
Rural networking connectivity is a very dynamic and attractive research field. Nowadays big IT companies like Google and Facebook are working to help connect all these rural disconnected people to Internet. Our research work is another effort in this direction. We are building a new solution based on previously tested ideas that can bring no real-time Internet connectivity to rural users using Delay/Disruption...
Using Interests (requests that elicit content) and maintaining per-Interest forwarding state in Pending Interest Tables (PIT) are integral to the design of the Named Data Networking (NDN) and Content-Centric Networking (CCNx) architectures. However, using PITs makes the network vulnerable to Interest-flooding attacks, and PITs can become very large. It is shown that in-network caching eliminates the...
Internet protocol version 6 defined in 1995 is a successor of the IPv4 protocol. It is being slowly deployed in Internet and so it becomes basis of all Internet communications. Since this process takes a long time IPv6 and IPv4 networks coexist in Internet and some transition mechanisms are needed to ensure their interconnectivity. Several mechanisms came to life based on tunneling or translation...
Competitive routing across peering links is a notable problem in Internet routing. A few years ago, a proposal to incrementally modify the Border Gateway Protocol (BGP) decision process was done, to improve routing coordination by leveraging on the existing multi-exit discriminator BGP attribute as signaling medium among peering Internet networks. It is called Peering Equilibrium Multipath (PEMP)...
Current Internet security is complex, expensive and ineffective. The usual argument is that the TCP/IP protocol suite was not designed having security in mind and security mechanisms have been added as add-ons or separate protocols. We argue that fundamental limitations in the Internet architecture are a major factor contributing to the insecurity of the Net. In this paper we explore the security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.