15,223 Hits in 4.0 sec

Future Internet Is by Ethernet [chapter]

Marko Luoma, Raimo Kantola, Jukka Manner
2010 IFIP Advances in Information and Communication Technology  
We argue that the solution is to redesign the Internet by gradually replacing IP with a carrier grade transport system.  ...  We argue that the new architecture must respond to two key challenges: (1) increase trust among Internet stakeholders and (2) provide cost efficient scaling of the network to new levels of capacity, number  ...  Recursive addressing is possible with protocol stacks such as IP over IP, MAC in MAC, IP over MAC-in-MAC, etc.  ... 
doi:10.1007/978-3-642-15476-8_11 fatcat:2wt3hnopmrbp5gtlucih4vs56e

A Tutorial on Trusted and Untrusted non-3GPP Accesses in 5G Systems – First Steps Towards a Unified Communications Infrastructure [article]

Mario Teixeira Lemes, Cristiano Bonato Both, Antonio C. de Oliveira Jr., Kleber Vieira Cardoso
2021 arXiv   pre-print
point of view of protocol stack and exchanged messages between the network functions.  ...  recently published the Release 16 that includes trusted non-3GPP access network concept and wireless wireline convergence.  ...  After the NWt connection, case (b), CP protocol stack becomes the same used in untrusted access: UE establishes a TCP connection with TNGF to transport NAS and session management messages over IP layer  ... 
arXiv:2109.08976v2 fatcat:j4s25o2obffvxijbrr45zxtaim

Using a Trusted WLAN Network to Offload Mobile Traffic and Leverage Deployed Broadband Network Gateways

Laurent Thiébaut, Wim Henderickx, Alistair Urie
2012 Bell Labs technical journal  
The "Trusted WLAN interworking" solution is currently in development with one of Alcatel-Lucent's WLAN AP partners, and trials are expected to start shortly with a leading service provider.  ...  In parallel, Alcatel-Lucent is actively promoting this solution in 3GPP within the SaMOG-S2a Mobility Based on GTP and WLAN Access to EPC-Work Item.  ...  Failure to do so would incur the risk of forcing a UE that does not support IP address preservation to do so, which would crash the UE's IP stack.  ... 
doi:10.1002/bltj.21525 fatcat:5f2kwicpy5fsfnyveicc4fcgxy

Transport for Carrier Grade Internet

Raimo Kantola, Marko Luoma, Olli-Pekka Lamminen
2009 2009 IEEE Globecom Workshops  
The paper proposes to gradually phase off IP as the core packet networking protocol, move from fundamentally flat addressing and routing with numerous add-on improvements to recursive addressing and routing  ...  This paper discusses the problems of the modern Internet and prospects for its future development.  ...  In our opinion the experience of two IP stacks one on top of the other in the 3G access network shows that complex stacks lead to long packet delay and high cost.  ... 
doi:10.1109/glocomw.2009.5360778 fatcat:vptlvq34fvfknbyfoqplgnbwey

Banking iPS cells

Nuala Moran
2013 Nature Biotechnology  
The UK's national iPS cell bank HIPSCI aims to generate iPS cells from over 500 healthy individuals and 500 people with genetic disease.  ...  The company became embroiled in a legal battle with DuPont over DuPont's program to stack the Roundup Ready 2 gene with DuPont's own glyphosate resistance gene. Monsanto sued for patent infringement.  ... 
doi:10.1038/nbt0113-11 fatcat:ye4fwtzz6bailh3fh5voin2dte

Risk analysis of host identity protocol

Juha Sääskilahti, Mikko Särelä
2010 Proceedings of the Fourth European Conference on Software Architecture Companion Volume - ECSA '10  
Further study would be required on how to cover trust-and privacy aspects, how to improve ease of documentation and how to step from risk identification to security testing.  ...  The new Risk Identification method worked quite nicely. Particularly beneficial in the new method were the knowledge transfer, structuring of the interviews and visualization of the value chain.  ...  HIP in protocol stack Figure 8 illustrates how HIP integrates to the IP stack. The HIP protocol itself resides directly on IP (ie not on UDP/TCP).  ... 
doi:10.1145/1842752.1842794 dblp:conf/ecsa/SaaskilahtiS10 fatcat:7qpoc64625atjnc62ctdu47eu4

A Trustful Infrastructure for the Internet of Things Based on EPOSMote

Antonio Augusto Frohlich, Rodrigo Vieira Steiner, Leonardo Maccari Rufino
2011 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing  
It is presented to end users through a trustful communication protocol stack compatible with TCP/IP.  ...  containing IP datagrams.  ...  The proposed infrastructure is implemented around the EPOSMoteII platform and delivered to end users through a trustful communication protocol stack compatible with TCP/IP.  ... 
doi:10.1109/dasc.2011.35 dblp:conf/dasc/FrohlichSR11 fatcat:hc6wxwohgberlg327szgnev2b4

A cross-layer approach to trustfulness in the Internet of Things

Antonio Augusto Frohlich, Alexandre Massayuki Okazaki, Rodrigo Vieira Steiner, Peterson Oliveira, Jean Everson Martina
2013 16th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing (ISORC 2013)  
It is presented to end users through a trustful communication protocol stack compatible with TCP/IP.  ...  It is a mistake to assume that each embedded object in the Internet of Things will implement a TCP/IP stack similar to those present in contemporary operating systems.  ...  Energy efficiency is sought in EPOS TCP/IP stack by incorporating the pheromone concept behind ADHOP as the IP routing metric. F.  ... 
doi:10.1109/isorc.2013.6913223 dblp:conf/isorc/FrohlichOSOM13 fatcat:c42udhe4kjfsxny7uofnm25qky

SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients

Fabian Schwarz, Christian Rossow
2020 USENIX Security Symposium  
SENG shields an application in an SGX-tailored LibOS and transparently establishes an attestation-based DTLS channel between the SGX enclave and the central network gateway.  ...  An inability to attribute communication accurately and reliably to applications is at the heart of this problem.  ...  Also, we thank Cas Cremers for his feedback on the initial SENG design, and Giorgi Maisuradze for his paper draft review.  ... 
dblp:conf/uss/SchwarzR20 fatcat:kgs3oiq35bfrtcbatbyuxvjjli

Firewalls in an OSI-environment

Nils Harald Berge, Jon Ølnes
1996 Computer Communications  
A firewall is a well established security measure for connecting to the Internet (TCP/IP protocol suite).  ...  This paper discusses the consequences of introducing ISO-protocols from a firewalls point of view. As one might suspect, it is not trivial to transform from TCP/IP to OSI in this matter.  ...  The trusted router concept can easily be expanded to include all layers of the OSI-stack, and not just the network layer.  ... 
doi:10.1016/s0140-3664(96)01141-3 fatcat:we7xh3ikg5dczlzjenvtyrkr24

Table of Contents

2019 IEEE Communications Standards Magazine  
harchanDani, asem othman, anD John callahan The Trust over IP Stack Blockchain Research Beyond Cryptocurrencies hitesh teWari  ...  , remi venant, samer Wazan, anD manreet niJJar Zero-Knowledge Proofs Do Not Solve the Privacy-Trust Problem of Attribute-Based Credentials: What if Alice Is Evil?  ... 
doi:10.1109/mcomstd.2019.9031538 fatcat:lykbzdobdzfmzcjmrfjhjvmcp4

Reducing TCB size by using untrusted components

Michael Hohmuth, Michael Peter, Hermann Härtig, Jonathan S. Shapiro
2004 Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC - EW11  
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness.  ...  We argue that many secure applications can make use of untrusted components through trusted wrappers without risking security properties such as confidentiality and integrity.  ...  We argued that moving system components out of the TCB into the untrusted part of the system and communicating with them using IPC reduces the overall size of the TCB.  ... 
doi:10.1145/1133572.1133615 dblp:conf/sigopsE/HohmuthPHS04 fatcat:y5b66gfkkferbjbstpsi6znpru

Alternative Protocol Implementation for Wireless Sensor Network Nodes

C. O. Iwendi K. J. Offor
2013 General Medicine Open Access  
The summation of this method involves the integration of µIP stack to key management scheme, allowing the network to have extra security in the transmission and reception of data, and can be applied in  ...  This paper investigates the limitations of current TCP/IP structure and an integration using micro IPIP) and proposes an enhanced security technique for WSN nodes to solve issues arising from the node  ...  Contiki's µIP networking stack requires an initialisation of various modules required for correct communication in wireless sensor network such as µIP-fw (µIP forwarding) and µIP-over-mesh (µIP over Rime's  ... 
doi:10.4172/2167-0919.1000106 fatcat:me53cohidvfnhaxcqi632zhfeu

Security Issues and Challenges for the IoT-based Smart Grid

Chakib Bekara
2014 Procedia Computer Science  
However, security is seen as one of the major factors hampering the rapid and large scale adoption and deployment of both the IoT vision and the Smart Grid.  ...  as one of the largest IoT network.  ...  legacy systems), integration to the global Internet network is still possible through gateways, where proprietary non-IP stack protocols (Zigbee v1, HART, Z-Wave, etc.), are translated to/from IP stack  ... 
doi:10.1016/j.procs.2014.07.064 fatcat:w6csf4le6rcl7dbotvabvqnywq

Security for the core network of third generation mobile systems [chapter]

Günter Horn, Dirk Kröselberg, Stefan Pütz, Roland Schmitz
2001 IFIP Advances in Information and Communication Technology  
Figure 2: Secure IP inter-network communication via SEG entities SEGs operate at the border of a network, providing IP security for internetwork IP traffic.  ...  The first UMTS core network protocol that will be secured by IPsec is the IP-based GTP protocol, cf. section 2.2.  ...  The trust issues raised by this solution are difficult. The endpoints of the MAP communication would have to trust the ANLSG.  ... 
doi:10.1007/978-0-387-35413-2_25 fatcat:h22rdoqam5cjtefi32jkqwswum
« Previous Showing results 1 — 15 out of 15,223 results