Filters








13,597 Hits in 6.5 sec

A path layer for the Internet: Enabling network operations on encrypted protocols

Mirja Kuhlewind, Tobias Buhler, Brian Trammell, Stephan Neuhaus, Roman Muntener, Gorry Fairhurst
2017 2017 13th International Conference on Network and Service Management (CNSM)  
The deployment of encrypted transport protocols imposes new challenges for network operations.  ...  We propose an architectural solution to this issue, by introducing a new "path layer" for transport-independent, in-band signaling between Internet endpoints and network elements on the paths between them  ...  We intend PLUS as a foundational mechanism for research and experimentation with uses for an Internet-deployable path layer, and new methods for network traffic management leveraging cooperation between  ... 
doi:10.23919/cnsm.2017.8255973 dblp:conf/cnsm/KuhlewindBTNMF17 fatcat:7swsb2mhvvbntklp5cn3uxwbx4

A Path Layer for the Internet: Enabling Network Operations on Encrypted Protocols

Mirja Kühlewind, Tobias Bühler, Brian Trammell, Roman Müntener, Stephan Neuhaus, Gorry Fairhurst
2017
We propose an architectural solution to this issue, by introducing a new "path layer" for transport-independent, in-band signaling between Internet endpoints and network elements on the paths between them  ...  We define a path layer header on top of UDP to provide a common wire image for new, encrypted transports.  ...  We intend PLUS as a foundational mechanism for research and experimentation with uses for an Internet-deployable path layer, and new methods for network management leveraging cooperation between endpoints  ... 
doi:10.3929/ethz-b-000218005 fatcat:el6z4ib43vdfhjqrirw6nco4lq

Internet security architecture

Refik Molva
1999 Computer Networks  
The transport layer security protocol and security issues in the network control and management are then presented.  ...  Fear of security breaches has been a major reason for the business world's reluctance to embrace the Internet as a viable means of communication.  ...  ROUTING SECURITY Routing protocols that are responsible for maintaining network connectivity for all the TCP/IP traffic have recently become one of the main targets of attackers on the Internet.  ... 
doi:10.1016/s1389-1286(98)00016-4 fatcat:7c4yhcoytva43jiqf2lynojlte

Internet Attack Methods and Internet Security Technology

Olalekan Adeyinka
2008 2008 Second Asia International Conference on Modelling & Simulation (AMS)  
The Internet is a complex and dynamic environment in terms of both topology and emerging technology.  ...  In such an environment, security measures applied for small well-defined networks cannot work effectively.  ...  The RFC 2401 defines IPSec as a framework that provides security services at the IP layer by enabling a system to select required security protocols, determine the algorithms(s) to use for the service(  ... 
doi:10.1109/ams.2008.68 dblp:conf/asiams/Adeyinka08 fatcat:ypvlbmdndjezlnqalwbyszn4s4

Privacy, Control and Internet Mobility [chapter]

Tuomas Aura, Alf Zugenmaier
2006 Lecture Notes in Computer Science  
Internet, and the peer endpoints.  ...  We consider the information about the users identity, location, and the serviced accessed that is necessarily or unnecessarily revealed observers, including the access network, intermediaries within the  ...  These addresses are visible to all nodes on the network if the LAN is unprotected by link-layer encryption, or if the encryption is based on a shared key.  ... 
doi:10.1007/11861386_14 fatcat:klymr2di65hxrpnb7zjeqw2vla

IPv6: the new Internet protocol

W. Stallings
1996 IEEE Communications Magazine  
available on the Internet.  ...  the role of an internet protocol, looks at the motivation for developing a new version of IP, and then examines some of its details.  ...  In other words, the path discovery algorithm enables a node to learn the MTU of the "bottleneck" subnetwork on the path.  ... 
doi:10.1109/35.526895 fatcat:zo7inb4qmrdihhvzcwgzdqcgim

On Building Onion Routing into Future Internet Architectures [chapter]

Daniele E. Asoni, Chen Chen, David Barrera, Adrian Perrig
2016 Lecture Notes in Computer Science  
User privacy on the Internet has become a pressing concern in recent years largely due to the revelations of large scale network surveillance programs.  ...  In this paper, we survey the main design challenges of network layer onion routing protocols in FIAs. We empirically investigate the requirements and trade-offs of different design choices.  ...  Conclusion This paper has given an overview of the design considerations, trade-offs, and challenges in deploying onion routing anonymity systems on future Internet architectures.  ... 
doi:10.1007/978-3-319-39028-4_6 fatcat:h6ove4ae5nfvbkips6hxw22asi

Network Privacy Reflection using Internet of Things

K. Thamizhmaran
2021 Zenodo  
In this paper, we overview both IoT enabled network architecture as well as security for associated objects and devices.  ...  We commence with a description of a generalized IoT enabled network's security architecture as well as how the various elements constituting them interact.  ...   LoRaWAN: Network protocol intend- ed for wireless battery-operated devic- es.  ... 
doi:10.5281/zenodo.4477853 fatcat:d3xvg7utuvgqzcrsssaksnlvtm

Dovetail: Stronger Anonymity in Next-Generation Internet Routing [article]

Jody Sankey, Matthew Wright
2014 arXiv   pre-print
Additional design features include the choice of many different paths through the network and the joining of path segments without requiring a trusted third party.  ...  foundation for Internet privacy, while allowing identity to be defined in those higher level protocols where it adds value.  ...  The protocol enables the choice of many different paths through the network and does not require a trusted third party.  ... 
arXiv:1405.0351v2 fatcat:q52o6bhhwzc2hm4rng66odak6a

Internet of Things Security

Sheeba Backia Mary Baskaran, Sivabalan Arumugam, Anand R. Prasad
2019 Journal of ICT Standardization  
Moreover, 80% did not offer the user the possibility to enable strong passwords, forcing them to rely on a weak one by today's industry standards.  ...  Her research interest includes LTE, LTE-Advanced, 5G, IoT Security and MAC layer protocol design. She is a 3GPP SA3 delegate and GISFI member.  ...  For such CIoT devices, if application level security is enabled, encryption may not be a critical need between the UE and the gNB.  ... 
doi:10.13052/jicts2245-800x.712 fatcat:xfdfs3dmsvevbolwacwfh2rqaq

Architecting a secure internet

Saikat Guha, Paul Francis
2005 Proceedings of the twentieth ACM symposium on Operating systems principles - SOSP '05  
Our goal is to secure the Internet by largely turning off connectivity in the Internet, and then using explicit signaling to selectively enable only those connections that are deemed necessary for performing  ...  The Internet strives to allow any host to communicate with any other host, while the principle of least privilege advocates limiting host connectivity to the smallest set necessary for performing a task  ...  Effectively, our approach largely turns off connectivity in the Internet, and then selectively enables only those connections that are deemed necessary for performing a task.  ... 
doi:10.1145/1095810.1118614 fatcat:ji7y2v34xvetvhjzbss2vk4ufa

A Tiered Control Plane Model for Service Function Chaining Isolation

Håkon Gunleifsen, Vasileios Gkioulos, Thomas Kemmerich
2018 Future Internet  
Current NFV implementations are designed for deployment within trusted domains, where overlay networks with static trusted links are utilized for enabling network security.  ...  Accordingly, we propose an architecture for automated establishment of encrypted tunnels in NFV, which introduces a novel, tiered east-west communication channel between network controllers in a multi-domain  ...  Running common encryption services on the Internet Protocol (IP) layer introduces an SFC routing problem because the packet encryption hides or changes the meta-data information such as the destination  ... 
doi:10.3390/fi10060046 fatcat:iqv5vsenf5es7mkqzc3vjbam3u

Encrypting the internet

Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mathew Eszenyi, Shay Gueron, David Durham
2010 Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM - SIGCOMM '10  
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is protected today.  ...  The primary reason for this neglect is economic, mainly security protocol speed and cost.  ...  Despite the obvious need for end-to-end security in the Internet, most of the traffic is not encrypted or protected today. The primary reasons for this are protocol speed and cost.  ... 
doi:10.1145/1851182.1851200 dblp:conf/sigcomm/KounavisKGEGD10 fatcat:elf5267cqjhqhp5xkbtckx5iry

Encrypting the internet

Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mathew Eszenyi, Shay Gueron, David Durham
2010 Computer communication review  
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is protected today.  ...  The primary reason for this neglect is economic, mainly security protocol speed and cost.  ...  Despite the obvious need for end-to-end security in the Internet, most of the traffic is not encrypted or protected today. The primary reasons for this are protocol speed and cost.  ... 
doi:10.1145/1851275.1851200 fatcat:v7amn2b2b5a4daerus2tagmbmy

Internet-based secure virtual networks

Luca Delgrossi, Diana Ferrari, Stephan Fischer, Ralf Steinmetz, Heinrich J. Stuettgen, Harmen R. van As, Roberto Vercelli
1998 Broadband European Networks and Multimedia Services  
Supranets are virtual networks -private to a group of users -that can be built on top of a physical network (e.g., the Internet) by any user of such a network making use of an appropriate software toolkit  ...  This paper discusses the ideas on which supranets are based as well as the security issues to be considered when designing supranets on top of the Internet.  ...  Figure 1 : 1 Position of the Supranet Layer in the Internet Protocol Stack. Figure 2 : 2 A supranet route connecting hosts 'A' and 'E' through 'B', 'C', and 'D'.  ... 
doi:10.1117/12.321907 dblp:conf/syben/DelgrossiF98 fatcat:nmqdirabpnghjlzqwp2p66vhla
« Previous Showing results 1 — 15 out of 13,597 results