Verifying and enforcing network paths with ICING
Jad Naous, Michael Walfish, Antonio Nicolosi, David Mazières, Michael Miller, and Arun Seehra
1
Verifying and enforcing network paths with ICING Jad Naous , Michael - - PowerPoint PPT Presentation
Verifying and enforcing network paths with ICING Jad Naous , Michael Walfish, Antonio Nicolosi, David Mazires, Michael Miller, and Arun Seehra 1 Today: New protocol for every feature Remote VPN, Private WANs, Specifying QoS, Firewalls,
1
2
3
4
5
6
7
8
9
10
11
12
13
14
ICING Header: Path = <Sender, R1, R2, R3> Verif = <V1, V2, V3>
15
16
17
18
19
Path Verifiers R0 R1 R2 R3 Proofs
20
Path Verifiers R0 R1 R2 R3 Proofs
21
Path Verifiers R0 R1 R2 R3
Proofs
22
Path Verifiers R0 R1 R2 R3
Proofs Path Verifiers R0 R1 R2 R3 Proofs
23
24
Path Verifiers R0 R1 R2 R3 Proofs Path PK0 PK1 PK2 PK3 Verifiers
25
Path PK0 PK1 PK2 PK3 Verifiers
Path PK0 PK1 PK2 PK3 Verifiers
26
27
28
29
Hash (CHI) Pair-wise Key Lookup PMAC CBC-MAC Consent Key Lookup
30
31
32
33
100% 50% 0% 500 1000 1500 2000 2500 3000 3500 4000 500 1000
34
35
36
37
38