Programmable In-Network Obfuscation of Traffic
AI-generated Key Points
⚠The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.
- Recent advances in programmable switch hardware have opened up new possibilities for protecting user privacy
- PINOT is a lightweight in-network anonymity solution that operates at line rate within the memory and processing limitations of hardware switches
- PINOT encrypts a client's IPv4 address, effectively concealing it from downstream Autonomous Systems (ASes) and the destination server
- PINOT is easy to deploy and does not require any end-user software or cooperation from other networks
- A prototype of PINOT was implemented on the Barefoot Tofino switch and deployed in a campus network
- The performance of PINOT was evaluated by measuring its ability to protect user identity against public DNS, NTP, and WireGuard VPN services
- Results show that PINOT successfully hides users' IP addresses while preserving network performance
- This paper introduces an innovative approach to preserving user privacy using programmable switch hardware
Authors: Liang Wang, Hyojoon Kim, Prateek Mittal, Jennifer Rexford
Abstract: Recent advances in programmable switch hardware offer a fresh opportunity to protect user privacy. This paper presents PINOT, a lightweight in-network anonymity solution that runs at line rate within the memory and processing constraints of hardware switches. PINOT encrypts a client's IPv4 address with an efficient encryption scheme to hide the address from downstream ASes and the destination server. PINOT is readily deployable, requiring no end-user software or cooperation from networks other than the trusted network where it runs. We implement a PINOT prototype on the Barefoot Tofino switch, deploy PINOT in a campus network, and present results on protecting user identity against public DNS, NTP, and WireGuard VPN services.
Ask questions about this paper to our AI assistant
You can also chat with multiple papers at once here.
⚠The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.
Assess the quality of the AI-generated content by voting
Score: 0
Why do we need votes?
Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.
The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.
⚠The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.
Similar papers summarized with our AI tools
Navigate through even more similar papers through a
tree representationLook for similar papers (in beta version)
By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.
Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.