{"id":"https://openalex.org/W4395017733","doi":"https://doi.org/10.1109/tdsc.2024.3392299","title":"StealthPath: Privacy-Preserving Path Validation in the Data Plane of Path-Aware Networks","display_name":"StealthPath: Privacy-Preserving Path Validation in the Data Plane of Path-Aware Networks","publication_year":2024,"publication_date":"2024-04-22","ids":{"openalex":"https://openalex.org/W4395017733","doi":"https://doi.org/10.1109/tdsc.2024.3392299"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3392299","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3392299","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043311300","display_name":"Jiliang Li","orcid":"https://orcid.org/0000-0001-9506-3634"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiliang Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113094575","display_name":"Yuan Su","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Su","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070447777","display_name":"Rongxing Lu","orcid":"https://orcid.org/0000-0001-5720-0941"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada","Faculty of Computer Science, University of New Brunswick, Fredericton, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada","institution_ids":["https://openalex.org/I106938459"]},{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, Fredericton, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066407180","display_name":"Zhou Su","orcid":"https://orcid.org/0000-0002-6518-3130"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhou Su","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085755018","display_name":"Weizhi Meng","orcid":"https://orcid.org/0000-0003-4384-5786"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Weizhi Meng","raw_affiliation_strings":["Department of Applied Mathematics and Computer Science, Technical University of Denmark, Copenhagen, Denmark"],"affiliations":[{"raw_affiliation_string":"Department of Applied Mathematics and Computer Science, Technical University of Denmark, Copenhagen, Denmark","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047030842","display_name":"Meng Shen","orcid":"https://orcid.org/0000-0002-1867-0972"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Shen","raw_affiliation_strings":["School of Cyberspace Security, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5043311300"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":1.7302,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.84641565,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"22","issue":"1","first_page":"192","last_page":"204"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.7913855910301208},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6339138746261597},{"id":"https://openalex.org/keywords/plane","display_name":"Plane (geometry)","score":0.468924343585968},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2676103711128235},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18357950448989868},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.04936662316322327}],"concepts":[{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.7913855910301208},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6339138746261597},{"id":"https://openalex.org/C17825722","wikidata":"https://www.wikidata.org/wiki/Q17285","display_name":"Plane (geometry)","level":2,"score":0.468924343585968},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2676103711128235},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18357950448989868},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.04936662316322327}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2024.3392299","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3392299","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:eprints.lancs.ac.uk:227293","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6336618320","display_name":null,"funder_award_id":"62102305","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W39299451","https://openalex.org/W1575519872","https://openalex.org/W1987869670","https://openalex.org/W2006435204","https://openalex.org/W2044442658","https://openalex.org/W2099995703","https://openalex.org/W2122516858","https://openalex.org/W2407898405","https://openalex.org/W2520004042","https://openalex.org/W2792036879","https://openalex.org/W2913435035","https://openalex.org/W2914876907","https://openalex.org/W3004615344","https://openalex.org/W3034257221","https://openalex.org/W3045016378","https://openalex.org/W3084879446","https://openalex.org/W3092180934","https://openalex.org/W3092419015","https://openalex.org/W3116203245","https://openalex.org/W3128033608","https://openalex.org/W3183812227","https://openalex.org/W3192325837","https://openalex.org/W3198759872","https://openalex.org/W3205104748","https://openalex.org/W3208203740","https://openalex.org/W3211133361","https://openalex.org/W4251630043","https://openalex.org/W4285212123","https://openalex.org/W4287448269","https://openalex.org/W4316022290","https://openalex.org/W4317904871","https://openalex.org/W4362706863","https://openalex.org/W4390805739","https://openalex.org/W6676104933","https://openalex.org/W6754318490","https://openalex.org/W6782090528","https://openalex.org/W6839162702"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W4395014643","https://openalex.org/W4391913857","https://openalex.org/W2350741829"],"abstract_inverted_index":{"Network":[0],"path":[1,11,36,54,80,106,128,136,143,159,162,201],"validation":[2,37,55],"aims":[3],"to":[4,30,63,78,104,118,129,154,174,194],"give":[5],"more":[6,217],"control":[7],"over":[8],"the":[9,21,49,70,74,102,127,131,134,141,145,149,158,166,179,200],"forwarding":[10,135,142],"of":[12,133],"data":[13],"packets":[14],"in":[15,48,144],"a":[16,39,66],"path-aware":[17],"network,":[18],"which":[19,92,156],"shields":[20],"network":[22,35],"from":[23,152,183],"security":[24],"threats":[25],"and":[26,44,59,82,86,108,122,147,161,164,178,198,213,215],"allows":[27,171],"end":[28,57],"hosts":[29,58],"receive":[31],"better":[32],"services.":[33],"Therefore,":[34],"becomes":[38],"vital":[40],"primitive":[41],"for":[42],"secure":[43],"reliable":[45],"Internet":[46],"services":[47],"next":[50,180],"generation":[51],"networks.":[52],"The":[53,203],"enables":[56],"intermediate":[60],"router":[61],"nodes":[62,125,173],"check":[64,130],"whether":[65],"packet":[67,90,94],"has":[68],"followed":[69],"intended":[71],"path.":[72],"However,":[73],"existing":[75],"solutions":[76],"fail":[77],"protect":[79,105],"privacy":[81,107],"incur":[83],"significant":[84],"bandwidth":[85,167],"computation":[87],"overhead":[88],"on":[89,126],"transferring,":[91],"degrades":[93],"delivery":[95,110],"performance.":[96],"In":[97],"this":[98],"paper,":[99],"we":[100],"propose":[101],"StealthPath":[103,113,139,170,191,207],"improve":[109],"efficiency.":[111],"Firstly,":[112],"uses":[114],"lightweight":[115],"cryptographic":[116],"primitives":[117],"generate":[119],"nested":[120],"proofs":[121,146,177],"ensures":[123],"all":[124],"compliance":[132],"efficiently.":[137],"Secondly,":[138],"hides":[140],"reduces":[148],"proof":[150,184],"size":[151,212],"linear":[153],"constant,":[155],"protects":[157],"information":[160],"length,":[163],"decreases":[165],"consumption.":[168],"Moreover,":[169],"on-path":[172,187],"extract":[175],"their":[176],"hop":[181],"address":[182],"without":[185],"leaking":[186],"node":[188],"index.":[189],"Finally,":[190],"is":[192,216],"proved":[193],"resist":[195],"various":[196],"attacks":[197],"preserves":[199],"privacy.":[202],"experiments":[204],"show":[205],"that":[206],"saves":[208],"nearly":[209],"60%":[210],"header":[211],"bandwidth,":[214],"efficient":[218],"than":[219],"state-of-the-art":[220],"schemes.":[221]},"counts_by_year":[{"year":2025,"cited_by_count":5}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
