scispace - formally typeset
Open AccessBook

SCION: A Secure Internet Architecture

Reads0
Chats0
TLDR
This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability.
Abstract
This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust information, multipath communication, scalable quality-of-service guarantees, and efficient forwarding. The book includes functional specifications of the network elements, communication protocols among these elements, data structures, and configuration files. In particular, the book offers a specification of a working prototype. The authors provide a comprehensive description of the main design features for achieving a secure Internet architecture. They facilitate the reader throughout, structuring the book so that the technical detail gradually increases, and supporting the text with a glossary, an index, a list of abbreviations, answers to frequently asked questions, and special highlighting for examples and for sections that explain important research, engineering, and deployment features. The book is suitable for researchers, practitioners, and graduate students who are interested in network security.

read more

Citations
More filters
Journal ArticleDOI

Internet backbones in space

TL;DR: This work studies cost-performance tradeoffs in the design space for Internet routing that incorporates satellite connectivity examining four solutions ranging from naively using BGP to an ideal, clean-slate design and finds that the optimal solution is provided by a path-aware networking architecture in which end-hosts obtain information and control over network paths.
Journal ArticleDOI

The SCION internet architecture

TL;DR: Adhering to the end- to-end principle even more than the current Internet yields highly available point-to-point communication.
Proceedings ArticleDOI

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer

TL;DR: This work proposes TARANET, an anonymity system that implements protection against traffic analysis at the network layer, and limits the incurred latency and overhead.
Proceedings ArticleDOI

Networking in Heaven as on Earth

TL;DR: Motivated by the potential of the new satellite networks, business and interconnection models for space-operating ISPs and how they could be integrated into the backbone of today's Internet are described.
Proceedings ArticleDOI

PISKES: Pragmatic Internet-Scale Key-Establishment System

TL;DR: PISKES has been developed for the SCION secure Internet architecture but is also applicable to today's Internet and has the potential to finally bring network-layer authentication to the Internet.
References
More filters
Journal ArticleDOI

The Tragedy of the Commons

TL;DR: The population problem has no technical solution; it requires a fundamental extension in morality.
Journal ArticleDOI

OpenFlow: enabling innovation in campus networks

TL;DR: This whitepaper proposes OpenFlow: a way for researchers to run experimental protocols in the networks they use every day, based on an Ethernet switch, with an internal flow-table, and a standardized interface to add and remove flow entries.
Journal ArticleDOI

Space/time trade-offs in hash coding with allowable errors

TL;DR: Analysis of the paradigm problem demonstrates that allowing a small number of test messages to be falsely identified as members of the given set will permit a much smaller hash area to be used without increasing reject time.
Book ChapterDOI

The Byzantine generals problem

TL;DR: In this article, a group of generals of the Byzantine army camped with their troops around an enemy city are shown to agree upon a common battle plan using only oral messages, if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals.
Book ChapterDOI

The Sybil Attack

TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Related Papers (5)