Home > Research > Publications & Outputs > StealthPath

Electronic data

  • StealthPath

    Accepted author manuscript, 2.21 MB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

Links

Text available via DOI:

View graph of relations

StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published
  • Jiliang Li
  • Yuan Su
  • Rongxing Lu
  • Zhou Su
  • Weizhi Meng
  • Meng Shen
Close
<mark>Journal publication date</mark>28/02/2025
<mark>Journal</mark>IEEE Transactions on Dependable and Secure Computing
Issue number1
Volume22
Number of pages13
Pages (from-to)192-204
Publication StatusPublished
Early online date22/04/24
<mark>Original language</mark>English

Abstract

Network path validation aims to give more control over the forwarding path of data packets in a path-aware network, which shields the network from security threats and allows end hosts to receive better services. Therefore, network path validation becomes a vital primitive for secure and reliable Internet services in the next generation networks. The path validation enables end hosts and intermediate router nodes to check whether a packet has followed the intended path. However, the existing solutions fail to protect path privacy and incur significant bandwidth and computation overhead on packet transferring, which degrades packet delivery performance. In this paper, we propose the StealthPath to protect path privacy and improve delivery efficiency. First, StealthPath uses lightweight cryptographic primitives to generate nested proofs and ensures all nodes on the path to check the compliance of the forwarding path efficiently. Second, StealthPath hides the forwarding path in the proofs and reduces the proof size from linear to constant, which protects the path information and path length, and decreases the bandwidth consumption. Moreover, StealthPath allows on-path nodes to extract their proofs and the next hop address from proof without leaking on-path node index. Finally, StealthPath is proved to resist various attacks and preserves the path privacy. The experiments show that StealthPath saves nearly 60% header size and bandwidth, and is more efficient than state-of-the-art schemes.