Research Article

Constant-Size Credential-Based Packet Forwarding Verification in SDN

Table 1

Some major notations used in the paper.

NotationMeaning

||Concatenation of strings
H 1 (ˑ)Hash function
H 2 (ˑ)Hash function
Hash (ˑ)Cryptographic hash operation function
MACK (ˑ)Message authentication code operation using key K
N iSwitch identifier
PKiSwitch node Ni’s public key
SKiSwitch Node Ni’s private key
PATHFlow path information
MACiMessage authentication code
SIDFlow identifier
k independent hash operation functions
PayloadPayload in a packet
PVFField enabling node Ni to verify the packet
PktHashDigest of the packet’s payload
LFlow path length
skiAnonymous key shared between N0 and Ni