Home > Research > Publications & Outputs > StealthPath

Electronic data

  • StealthPath

    Accepted author manuscript, 2.21 MB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

Links

Text available via DOI:

View graph of relations

StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks. / Li, Jiliang; Su, Yuan; Lu, Rongxing et al.
In: IEEE Transactions on Dependable and Secure Computing, Vol. 22, No. 1, 28.02.2025, p. 192-204.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Li, J, Su, Y, Lu, R, Su, Z, Meng, W & Shen, M 2025, 'StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks', IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 1, pp. 192-204. https://doi.org/10.1109/TDSC.2024.3392299

APA

Li, J., Su, Y., Lu, R., Su, Z., Meng, W., & Shen, M. (2025). StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks. IEEE Transactions on Dependable and Secure Computing, 22(1), 192-204. https://doi.org/10.1109/TDSC.2024.3392299

Vancouver

Li J, Su Y, Lu R, Su Z, Meng W, Shen M. StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks. IEEE Transactions on Dependable and Secure Computing. 2025 Feb 28;22(1):192-204. Epub 2024 Apr 22. doi: 10.1109/TDSC.2024.3392299

Author

Li, Jiliang ; Su, Yuan ; Lu, Rongxing et al. / StealthPath : Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks. In: IEEE Transactions on Dependable and Secure Computing. 2025 ; Vol. 22, No. 1. pp. 192-204.

Bibtex

@article{72091a8000d149eabe596faf84941125,
title = "StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks",
abstract = "Network path validation aims to give more control over the forwarding path of data packets in a path-aware network, which shields the network from security threats and allows end hosts to receive better services. Therefore, network path validation becomes a vital primitive for secure and reliable Internet services in the next generation networks. The path validation enables end hosts and intermediate router nodes to check whether a packet has followed the intended path. However, the existing solutions fail to protect path privacy and incur significant bandwidth and computation overhead on packet transferring, which degrades packet delivery performance. In this paper, we propose the StealthPath to protect path privacy and improve delivery efficiency. First, StealthPath uses lightweight cryptographic primitives to generate nested proofs and ensures all nodes on the path to check the compliance of the forwarding path efficiently. Second, StealthPath hides the forwarding path in the proofs and reduces the proof size from linear to constant, which protects the path information and path length, and decreases the bandwidth consumption. Moreover, StealthPath allows on-path nodes to extract their proofs and the next hop address from proof without leaking on-path node index. Finally, StealthPath is proved to resist various attacks and preserves the path privacy. The experiments show that StealthPath saves nearly 60% header size and bandwidth, and is more efficient than state-of-the-art schemes.",
author = "Jiliang Li and Yuan Su and Rongxing Lu and Zhou Su and Weizhi Meng and Meng Shen",
year = "2025",
month = feb,
day = "28",
doi = "10.1109/TDSC.2024.3392299",
language = "English",
volume = "22",
pages = "192--204",
journal = "IEEE Transactions on Dependable and Secure Computing",
issn = "1545-5971",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "1",

}

RIS

TY - JOUR

T1 - StealthPath

T2 - Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks

AU - Li, Jiliang

AU - Su, Yuan

AU - Lu, Rongxing

AU - Su, Zhou

AU - Meng, Weizhi

AU - Shen, Meng

PY - 2025/2/28

Y1 - 2025/2/28

N2 - Network path validation aims to give more control over the forwarding path of data packets in a path-aware network, which shields the network from security threats and allows end hosts to receive better services. Therefore, network path validation becomes a vital primitive for secure and reliable Internet services in the next generation networks. The path validation enables end hosts and intermediate router nodes to check whether a packet has followed the intended path. However, the existing solutions fail to protect path privacy and incur significant bandwidth and computation overhead on packet transferring, which degrades packet delivery performance. In this paper, we propose the StealthPath to protect path privacy and improve delivery efficiency. First, StealthPath uses lightweight cryptographic primitives to generate nested proofs and ensures all nodes on the path to check the compliance of the forwarding path efficiently. Second, StealthPath hides the forwarding path in the proofs and reduces the proof size from linear to constant, which protects the path information and path length, and decreases the bandwidth consumption. Moreover, StealthPath allows on-path nodes to extract their proofs and the next hop address from proof without leaking on-path node index. Finally, StealthPath is proved to resist various attacks and preserves the path privacy. The experiments show that StealthPath saves nearly 60% header size and bandwidth, and is more efficient than state-of-the-art schemes.

AB - Network path validation aims to give more control over the forwarding path of data packets in a path-aware network, which shields the network from security threats and allows end hosts to receive better services. Therefore, network path validation becomes a vital primitive for secure and reliable Internet services in the next generation networks. The path validation enables end hosts and intermediate router nodes to check whether a packet has followed the intended path. However, the existing solutions fail to protect path privacy and incur significant bandwidth and computation overhead on packet transferring, which degrades packet delivery performance. In this paper, we propose the StealthPath to protect path privacy and improve delivery efficiency. First, StealthPath uses lightweight cryptographic primitives to generate nested proofs and ensures all nodes on the path to check the compliance of the forwarding path efficiently. Second, StealthPath hides the forwarding path in the proofs and reduces the proof size from linear to constant, which protects the path information and path length, and decreases the bandwidth consumption. Moreover, StealthPath allows on-path nodes to extract their proofs and the next hop address from proof without leaking on-path node index. Finally, StealthPath is proved to resist various attacks and preserves the path privacy. The experiments show that StealthPath saves nearly 60% header size and bandwidth, and is more efficient than state-of-the-art schemes.

U2 - 10.1109/TDSC.2024.3392299

DO - 10.1109/TDSC.2024.3392299

M3 - Journal article

VL - 22

SP - 192

EP - 204

JO - IEEE Transactions on Dependable and Secure Computing

JF - IEEE Transactions on Dependable and Secure Computing

SN - 1545-5971

IS - 1

ER -