Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Massimo Rimondini is active.

Publication


Featured researches published by Massimo Rimondini.


international conference on rfid | 2010

Efficient and practical authentication of PUF-based RFID tags in supply chains

Pier Francesco Cortese; Francesco Gemmiti; Bernardo Palazzi; Maurizio Pizzonia; Massimo Rimondini

We propose new methodologies for the authentication of RFID tags along supply chains, exploiting tags equipped with a Physical Unclonable Function (PUF) device. Unlike state-of-the-art approaches that require sharing a large database of challenge-response pairs (CRPs), we achieve a constant amount of shared secret data, oblivious of the number of CRPs and tags to be handled. Such data can be distributed using a secure hardware token. The rest of the data can be released over an insecure one-way communication channel that can be realized by shipping storage media along with goods. We discuss the applicative scenario and perform experiments on pre-production PUF-based tags in order to assess the applicability of our approaches.


IEEE ACM Transactions on Networking | 2011

Wheel + ring = reel: the impact of route filtering on the stability of policy routing

Luca Cittadini; G. Di Battista; Massimo Rimondini; Stefano Vissicchio

Border Gateway Protocol (BGP) allows providers to express complex routing policies preserving high degrees of autonomy. However, unrestricted routing policies can adversely impact routing stability. A key concept to understand the interplay between autonomy and expressiveness on one side, and stability on the other side, is safety under filtering, i.e., guaranteed stability under autonomous usage of route filters. BGP route filters are used to selectively advertise specific routes to specific neighbors. In this paper, we provide a characterization of safety under filtering, filling the large gap between previously known necessary and sufficient conditions. Our characterization is based on the absence of a particular kind of dispute wheel, a structure involving circular dependencies among routing preferences. We exploit our result to show that networks admitting multiple stable states are provably unsafe under filtering, and the troublesome portion of the configuration can be pinpointed starting from the stable states alone. This is especially interesting from an operational point of view since networks with multiple stable states actually happen in practice (BGP wedgies). Finally, we show that adding filters to an existing configuration may lead to oscillations even if the configuration is safe under any link failure. Unexpectedly, we find policy configurations where misconfigured filters can do more harm than network faults.


acm special interest group on data communication | 2006

How to extract BGP peering information from the internet routing registry

Giuseppe Di Battista; Tiziana Refice; Massimo Rimondini

We describe an on-line service, and its underlying methodology, designed to extract BGP peerings from the Internet Routing Registry. Both the method and the service are based on: a consistency manager for integrating information across different registries, an RPSL analyzer that extracts peering specifications from RPSL objects, and a peering classifier that aims at understanding to what extent such peering specifications actually contribute to fully determine a peering. A peering graph is built with different levels of confidence. We compare the effectiveness of our method with the state of the art. The comparison puts in evidence the quality of the proposed method.


IEEE Transactions on Network and Service Management | 2011

From Theory to Practice: Efficiently Checking BGP Configurations for Guaranteed Convergence

Luca Cittadini; Massimo Rimondini; Stefano Vissicchio; M. Corea; G. Di Battista

Internet Service Providers can enforce a fine-grained control of Interdomain Routing by cleverly configuring the Border Gateway Protocol. However, the price to pay for the flexibility of BGP is the lack of convergence guarantees. The literature on network protocol design introduced several sufficient conditions that routing policies should satisfy to guarantee convergence. However, a methodology to systematically check BGP policies for convergence is still missing. This paper presents two fundamental contributions. First, we describe a heuristic algorithm that statically checks BGP configurations for guaranteed routing convergence. Our algorithm has several highly desirable properties: i) it exceeds state-of-the-art algorithms by correctly reporting more configurations as stable, ii) it can be implemented efficiently enough to analyze Internet-scale configurations, iii) it is free from false positives, namely never reports a potentially oscillating configuration as stable, and iv) it can help spot troublesome points in a detected oscillation. Second, we propose an architecture for a modular tool that exploits our algorithm to process native router configurations and report the presence of potential oscillations. Such a tool can effectively integrate syntactic checkers and assist operators in verifying configurations. We validate our approach using a prototype implementation and show that it scales well enough to enable Internet-scale convergence checks.


integrated network management | 2009

On the feasibility of static analysis for BGP convergence

Luca Cittadini; Massimo Rimondini; Matteo Corea; Giuseppe Di Battista

Internet Service Providers can enforce a fine grained control of Interdomain Routing by cleverly configuring the Border Gateway Protocol. However, the price to pay for the flexibility of BGP is the lack of convergence guarantees. Network protocol design literature introduced several sufficient conditions that routing policies should satisfy to guarantee convergence. However, to our knowledge, none of these conditions has yet been exploited to automatically check BGP policies for convergence.


integrated network management | 2015

Rethinking virtual private networks in the software-defined era

Gabriele Lospoto; Massimo Rimondini; Benedetto Gabriele Vignoli; Giuseppe Di Battista

Multi Protocol Label Switching (MPLS) Virtual Private Networks (VPNs) have seen an unparalleled increasing adoption in the last decade. Although their flexibility as transport technology and their effectiveness for traffic engineering are well recognized, VPNs are difficult to set up and manage, due to the complexity of configurations, to the number of involved protocols, and to the limited control and predictability of network behaviors. On the other hand, Software-Defined Networking (SDN) is a consolidated, yet still emerging paradigm by which the control plane logic of a network device is implemented by an arbitrarily programmed software that runs outside the device itself. We conjugate the effectiveness of traditional VPNs with the programmability of SDN, proposing a novel and improved realization of MPLS VPNs based on SDN. With our approach, provisioning and setup of VPNs are accomplished by using a simple and flexible configuration language. Management and troubleshooting are facilitated because only a minimal set of technologies (notably, just MPLS) is retained. Control and predictability of network behaviors are enhanced by the centralized coordination enforced by the SDN controller. Besides illustrating our proposed approach and specifying the configuration language, we describe a prototype implementation of a controller and the outcome of tests we conducted in several configuration scenarios.


international conference on network protocols | 2010

Assigning AS relationships to satisfy the Gao-Rexford conditions

Luca Cittadini; Giuseppe Di Battista; Thomas Erlebach; Maurizio Patrignani; Massimo Rimondini

Compliance with the Gao-Rexford conditions [1] is perhaps the most realistic explanation of Internet routing stability, although BGP is renowned to be prone to oscillations. Informally, the Gao-Rexford conditions assume that (i) the business relationships between Internet Service Providers (ISPs) yield a hierarchy, (ii) each ISP behaves in a rational way, i.e., it does not offer transit to other ISPs for free, and (iii) each ISP ranks routes through customers better than routes through providers and peers.


international conference on network protocols | 2009

wheel + ring = reel: the impact of route filtering on the stability of policy routing

Luca Cittadini; Giuseppe Di Battista; Massimo Rimondini; Stefano Vissicchio

BGP allows providers to express complex routing policies preserving high degrees of autonomy. However, unrestricted routing policies can adversely impact routing stability. A key concept to understand the interplay between autonomy and expressiveness on one side, and stability on the other side, is safety under filtering, i.e., guaranteed stability under autonomous usage of route filters. BGP route filters are used to selectively advertise specific routes to specific neighbors. We provide a necessary and sufficient condition for safety under filtering, filling the large gap between previously known necessary and sufficient conditions. Our characterization is based on the absence of a particular kind of dispute wheel, a structure involving circular dependencies among routing preferences. We exploit our result to show that networks admitting multiple stable states are provably unsafe under filtering. This is especially interesting from an operational point of view, since networks with multiple stable states actually happen in practice (BGP wedgies). Finally, we show that adding filters to an existing configuration may lead to oscillations even if the configuration is safe under any link failure. Unexpectedly, we find policy configurations where misconfigured filters can do more harm than network faults.


international conference on computer communications and networks | 2009

Covert Channel for One-Way Delay Measurements

Mario Cola; Giorgio De Lucia; Daria Mazza; Maurizio Patrignani; Massimo Rimondini

We propose a novel, passive, nonintrusive method to measure the one-way delay of all the packets flowing between customer sites connected by a provider backbone. Our approach does not sample traffic and requires the injection of a negligible amount of control packets, possibly none. This is obtained by deploying a Measurement Agent in each customer site and exploiting a covert channel to carry information about each packet that transits between the Measurement Agents. Further, we address the theoretical problems of encoding measurement information into the very limited amount of bits made available by the covert channel, obtaining one-way delay measurements with predictable accuracy. Finally, we experimentally validate the applicability of our approach.


2016 IEEE NetSoft Conference and Workshops (NetSoft) | 2016

How to handle ARP in a software-defined network

Roberto di Lallo; Gabriele Lospoto; Massimo Rimondini; Giuseppe Di Battista

The Address Resolution Protocol (ARP) enables communication between IP-speaking nodes in a local network by reconstructing the hardware (MAC) address associated with the IP address of an interface. This is not needed in a Software-Defined Network (SDN), because each device can forward packets without the need to learn this association. We tackle the interoperability problem arising between standard network devices (end systems, routers), that rely on ARP, and SDN datapaths, that do not handle ARP packets natively. In particular, we propose a general approach to handle ARP in a SDN, that is applicable in several network scenarios, is transparent for existing devices, and can coexist with any packet forwarding logic implemented in the controller. Our approach reduces ARP traffic by confining it to the edge of SDNs and requires a minimal set of flow entries in the datapaths. We argument about its applicability and confirm it with experiments performed on SDN datapaths from a range of different vendors.

Collaboration


Dive into the Massimo Rimondini's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

G. Di Battista

Sapienza University of Rome

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge