Information assurance in the SQoS network

Pitipatana Sakarindr, Nirwan Ansari, Roberto Rojas-Cessa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In the SQoS network as introduced in [1] and [2], the border router in every autonomous system (AS) provides customized security mechanisms to the incoming packets. Some serious problems have been recently raised particularly when there are one or more compromised routers that attempt to modify, delete, or fabricate any part or the whole packet into the SQoS network. The compromised router can either passively or actively perform the malicious activities against the forwarding packets. The SQoS network does not explicitly specify the method to detect whether the data contained in the packets have been tampered by the compromised routers or by the end host itself. We deliberate the threats and propose several methods to detect both the malicious routers and end hosts such that SQoS information and payload are authentic and integrity-protected.

Original languageEnglish (US)
Title of host publication2006 IEEE Sarnoff Symposium
DOIs
StatePublished - 2006
Event2006 IEEE Sarnoff Symposium - Princeton, NJ, United States
Duration: Mar 27 2006Mar 28 2006

Publication series

Name2006 IEEE Sarnoff Symposium

Other

Other2006 IEEE Sarnoff Symposium
CountryUnited States
CityPrinceton, NJ
Period3/27/063/28/06

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Communication

Keywords

  • Information assurance
  • SQoS network

Fingerprint Dive into the research topics of 'Information assurance in the SQoS network'. Together they form a unique fingerprint.

Cite this