Journal
ACM COMPUTING SURVEYS
Volume 53, Issue 5, Pages -Publisher
ASSOC COMPUTING MACHINERY
DOI: 10.1145/3409796
Keywords
Future Internet architecture; packet forwarding; path validation; authentication
Categories
Funding
- National Science Foundation of China [61402404, 61602093]
- Natural Science Foundation of Zhejiang Province [LY19F020050]
- National Natural Science Foundation of China [61772236]
- Zhejiang Key RD Plan [2109C03133]
- Alibaba-Zhejiang University Joint Institute of Frontier Technologies
- Research Institute of Cyberspace Governance in Zhejiang University
- Leading Innovative and Entrepreneur Team Introduction Program of Zhejiang [2018R01005]
Ask authors/readers for more resources
Validating the network paths taken by packets is critical in constructing a secure Internet architecture. Any feasible solution must both enforce packet forwarding along end-host specified paths and verify whether packets have taken those paths. However, the current Internet supports neither enforcement nor verification. Likely due to the radical changes to the Internet architecture and a long-standing confusion between routing and forwarding, only limited solutions for path validation exist in the literature. This survey article aims to reinvigorate research on the essential topic of path validation by crystallizing not only how path validation works but also where seemingly qualified solutions fall short. The analyses explore future research directions in path validation aimed at improving security, privacy, and efficiency.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available