Research Article
Constant-Size Credential-Based Packet Forwarding Verification in SDN
Table 1
Some major notations used in the paper.
| Notation | Meaning |
| || | Concatenation of strings | H 1 (ˑ) | Hash function | H 2 (ˑ) | Hash function | Hash (ˑ) | Cryptographic hash operation function | MACK (ˑ) | Message authentication code operation using key K | N i | Switch identifier | PKi | Switch node Ni’s public key | SKi | Switch Node Ni’s private key | PATH | Flow path information | MACi | Message authentication code | SID | Flow identifier | | k independent hash operation functions | Payload | Payload in a packet | PVF | Field enabling node Ni to verify the packet | PktHash | Digest of the packet’s payload | L | Flow path length | ski | Anonymous key shared between N0 and Ni |
|
|