The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A scheme for preserving privacy in MobilityFirst (MF) clean-slate future Internet architecture is proposed in this paper. The proposed scheme, called Anonymity in MobilityFirst (AMF), utilizes the three-tiered approach to effectively exploit the inherent properties of MF Network such as Globally Unique Flat Identifier (GUID) and Global Name Resolution Service (GNRS) to provide anonymity to the users...
As a path vector protocol, Border Gateway Protocol (BGP) messages contain the entire Autonomous System (AS) path to each destination for breaking arbitrary long AS path loops. However, after observing the global routing data from RouteViews, we find that BGP AS path looping (BAPL) behavior does occur and in fact can lead to multi-AS forwarding loops in both IPv4 and IPv6. The number and ratio of BAPLs...
Transition techniques play a vital role during the evolvement process of the Internet from IPv4 to IPv6. However, packet length change during the forwarding process may result in fragmentation and reassembly of a large number of packets, which greatly impacts the forwarding performance. In addition, different Maximum Transmission Unit (MTU) mechanisms of IPv4 and IPv6 have also brought lots of troubles...
Information Centric Network or ICN is one of the few popular designs envisioned for the future Internet. In ICN, packets are routed by content-object names. Such names can be much more complicated as well as order of magnitude more in quantity than IP addresses, and the same content-objects might also be available for retrieval at more places in the network. As routing tables are always limited in...
IP Next Generation (IPng) or IPv6 engineered by IETF is the successor of IPv4, the contemporary version of Internet Protocol. IPv6 is designed to solve the long term performance, reliability and scalability problems of IPv4. Although IPv6 implementation is yet to attain a maturity level, its success will ultimately depend on its implementation in a broader perspective. The IPv6 network migration is...
Currently, the architecture of network device is closed. This is detrimental to the network inno vation. Software defined networking (SDN) [1] decouples the vertically coupled architecture, and reconstructs the Internet as a modular structure. The idea of SDN is widely accepted by both of the academic and industry researchers, and is considered as a promising way to re-architect the Internet. OpenFlow...
Since adversaries may spoof their source IPs in their attacks, traceback schemes have been proposed to identify the attack source. Among these methods, Hybrid IP traceback schemes fuse packet marking and packet logging, using only one packet for traceback and reducing the storage requirements during packet logging. However, if a hybrid traceback scheme logs a packet's digests on a router, the router's...
Connection of wireless sensor and actuator networks (WSANs) to the Internet will enable information flow to these once isolated networks. Distributed Ambient Intelligence (AmI) applications, such as remote monitoring and control services, would become possible if Internet connectivity of WSANs is achieved. However, realization of such applications remains challenging with three major obstacles. First,...
Border Gateway Protocol (BGP) is the defacto inter-domain routing protocol in the Internet. It was designed without an inherent security mechanism and hence is prone to a number of vulnerabilities which can cause large scale disruption in the Internet. Route leak is one such inter-domain routing security problem which has the potential to cause wide-scale Internet service failure. Route leaks occur...
Multi-homing is one of the primary causes for the exponential growth rate of the global routing table (GRT). This work proposes a stub multihoming solution called Multi-Addressing with Stub Tunnels (MAST). By combining IPv6 multi-addressing with backup tunnels between a stub and each of its providers, stubs can enjoy the reliability advantages of multihoming without adding to the size of the GRT....
With the global widespread usage of the Internet, more and more cyber-attacks are being performed. Many of these attacks utilize IP address spoofing. This paper describes IP spoofing attacks and the proposed methods currently available to detect or prevent them. In addition, it presents a statistical analysis of the Hop Count parameter used in our proposed IP spoofing detection algorithm. We propose...
IPv6 has been developed to deal with the increase in number of hosts in the Internet. IPv6 address can be assigned to any network devices. IPv6 provides new function called SLAAC (Stateless Address Auto Configuration). SLAAC is a significant feature for host itself generating and configuring own addresses to enable communication. But this feature has drawbacks in term of security and management of...
The Internet's interdomain routing architecture has undergone only minor changes since its inception. It presents issues difficult to solve such as the difficulty in deploying new features, understanding its behavior and dynamics, identification and faults correction. Efforts have been made to address these issues but implementation of new applications onto the Internet architecture is a hard task...
Mobile Ad hoc Network (MANET) consists of a set of mobile nodes which communicate among them only using their wireless interface. In order to get connected with internet, mobile nodes need to find out Gateway (GW), a particular type of mobile nodes which are directly connected with internet. Proactive, reactive, and hybrid, are the three methods for gateway discovery. In hybrid approach, GW nodes...
Anonymous declared that it would hack North Korea, the world-wide closing country on June 25 in 2013, using internal supporters, but it is not known to have succeeded in hacking concretely. However, our previous study suggested hacking with Ninja gate, not with the existing method by connected routing. As a result of this study, we mentioned that even though it is a closing network, it will need a...
Route leaks are one of the anomalies of inter-domain routing that have the capacity to produce large Internet service disruptions. Route leaks are caused because of violation of routing policies among Autonomous Systems. Unfortunately, there are not many studies that formally and thoroughly analyze the route leak problem. There exist few conventional solutions that can be used as a first line of defense,...
Community Wireless Networks can be a way to make “Internet access for everyone” possible, by sharing a broadband Internet connection via WLAN. The underlying idea is to freely provide network access to anybody in the vicinity of the wireless access point via a Lower-than-Best-Effort (LBE) service, such that non-paying users interfere as little as possible with the “regular” Internet usage. Such a...
In this paper, we report our development experience and experimentation studies of two multicast routing schemes for the Internet, namely, PIM-SSM and GCMR. We detail their implementation over the Quagga open source routing suite, as well as their experimentation tests over a large-scale topology that reproduces the Internet characteristics.
Originally defined in the 90s, multicast is nowadays (re)gaining interest given the increasing popularity of multimedia streaming/content traffic and the explosion of cloud services. In fact, multicast yields bandwidth savings complementing cached content distribution techniques and its potential benefits have been verified by studies several times since then (see e.g. [1]). By multicast routing,...
IPv6 Neighbor Discovery (ND) based on RFC 4861 is not designed for non-transitive wireless links. Its heavy use of multicast transmission makes it inefficient and sometimes impractical for IPv6 over Low power Wireless Personal Area Networks (6LoWPAN). Recently, further optimizations have been proposed by Internet Engineering Task Force (IETF) to make ND more suitable for 6LoWPAN. In this paper, we...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.