Programmable In-Network Obfuscation of Traffic

AI-generated keywords: Privacy PINOT Encryption Programmable Switch Hardware Deployment

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Recent advances in programmable switch hardware have opened up new possibilities for protecting user privacy
  • PINOT is a lightweight in-network anonymity solution that operates at line rate within the memory and processing limitations of hardware switches
  • PINOT encrypts a client's IPv4 address, effectively concealing it from downstream Autonomous Systems (ASes) and the destination server
  • PINOT is easy to deploy and does not require any end-user software or cooperation from other networks
  • A prototype of PINOT was implemented on the Barefoot Tofino switch and deployed in a campus network
  • The performance of PINOT was evaluated by measuring its ability to protect user identity against public DNS, NTP, and WireGuard VPN services
  • Results show that PINOT successfully hides users' IP addresses while preserving network performance
  • This paper introduces an innovative approach to preserving user privacy using programmable switch hardware
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Liang Wang, Hyojoon Kim, Prateek Mittal, Jennifer Rexford

Abstract: Recent advances in programmable switch hardware offer a fresh opportunity to protect user privacy. This paper presents PINOT, a lightweight in-network anonymity solution that runs at line rate within the memory and processing constraints of hardware switches. PINOT encrypts a client's IPv4 address with an efficient encryption scheme to hide the address from downstream ASes and the destination server. PINOT is readily deployable, requiring no end-user software or cooperation from networks other than the trusted network where it runs. We implement a PINOT prototype on the Barefoot Tofino switch, deploy PINOT in a campus network, and present results on protecting user identity against public DNS, NTP, and WireGuard VPN services.

Submitted to arXiv on 29 May. 2020

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2006.00097v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

Recent advances in programmable switch hardware have opened up new possibilities for protecting user privacy. In this paper, the authors present PINOT, a lightweight in-network anonymity solution that operates at line rate within the memory and processing limitations of hardware switches. PINOT employs an efficient encryption scheme to encrypt a client's IPv4 address, effectively concealing it from downstream Autonomous Systems (ASes) and the destination server. One notable advantage of PINOT is its ease of deployment. It does not require any end-user software or cooperation from networks other than the trusted network where it is implemented, making it readily deployable without significant modifications. To demonstrate its effectiveness, the authors implement a prototype on the Barefoot Tofino switch and deploy it in a campus network. They evaluate its performance by measuring its ability to protect user identity against public DNS, NTP, and WireGuard VPN services. The results show that PINOT successfully hides users' IP addresses from these services while preserving network performance. This paper introduces an innovative approach to preserving user privacy using programmable switch hardware and demonstrates its potential for broader adoption in various network environments.
Created on 14 Dec. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.