Open AccessBook
SCION: A Secure Internet Architecture
Reads0
Chats0
TLDR
This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability.Abstract:
This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust information, multipath communication, scalable quality-of-service guarantees, and efficient forwarding. The book includes functional specifications of the network elements, communication protocols among these elements, data structures, and configuration files. In particular, the book offers a specification of a working prototype. The authors provide a comprehensive description of the main design features for achieving a secure Internet architecture. They facilitate the reader throughout, structuring the book so that the technical detail gradually increases, and supporting the text with a glossary, an index, a list of abbreviations, answers to frequently asked questions, and special highlighting for examples and for sections that explain important research, engineering, and deployment features. The book is suitable for researchers, practitioners, and graduate students who are interested in network security.read more
Citations
More filters
Journal ArticleDOI
Internet backbones in space
TL;DR: This work studies cost-performance tradeoffs in the design space for Internet routing that incorporates satellite connectivity examining four solutions ranging from naively using BGP to an ideal, clean-slate design and finds that the optimal solution is provided by a path-aware networking architecture in which end-hosts obtain information and control over network paths.
Journal ArticleDOI
The SCION internet architecture
TL;DR: Adhering to the end- to-end principle even more than the current Internet yields highly available point-to-point communication.
Proceedings ArticleDOI
TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer
TL;DR: This work proposes TARANET, an anonymity system that implements protection against traffic analysis at the network layer, and limits the incurred latency and overhead.
Proceedings ArticleDOI
Networking in Heaven as on Earth
TL;DR: Motivated by the potential of the new satellite networks, business and interconnection models for space-operating ISPs and how they could be integrated into the backbone of today's Internet are described.
Proceedings ArticleDOI
PISKES: Pragmatic Internet-Scale Key-Establishment System
TL;DR: PISKES has been developed for the SCION secure Internet architecture but is also applicable to today's Internet and has the potential to finally bring network-layer authentication to the Internet.
References
More filters
Journal ArticleDOI
The Tragedy of the Commons
TL;DR: The population problem has no technical solution; it requires a fundamental extension in morality.
Journal ArticleDOI
OpenFlow: enabling innovation in campus networks
Nick McKeown,Thomas Anderson,Hari Balakrishnan,Guru Parulkar,Larry L. Peterson,Jennifer Rexford,Scott Shenker,Jonathan S. Turner +7 more
TL;DR: This whitepaper proposes OpenFlow: a way for researchers to run experimental protocols in the networks they use every day, based on an Ethernet switch, with an internal flow-table, and a standardized interface to add and remove flow entries.
Journal ArticleDOI
Space/time trade-offs in hash coding with allowable errors
TL;DR: Analysis of the paradigm problem demonstrates that allowing a small number of test messages to be falsely identified as members of the given set will permit a much smaller hash area to be used without increasing reject time.
Book ChapterDOI
The Byzantine generals problem
TL;DR: In this article, a group of generals of the Byzantine army camped with their troops around an enemy city are shown to agree upon a common battle plan using only oral messages, if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals.
Book ChapterDOI
The Sybil Attack
TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Related Papers (5)
The NEBULA Future Internet Architecture
Thomas Anderson,Kenneth P. Birman,Robert M. Broberg,Matthew Caesar,Douglas Comer,Chase Cotton,Michael J. Freedman,Andreas Haeberlen,Zachary G. Ives,Arvind Krishnamurthy,William Lehr,Boon Thau Loo,David Mazières,Antonio Nicolosi,Jonathan M. Smith,Ion Stoica,Robbert van Renesse,Michael Walfish,Hakim Weatherspoon,Christopher S. Yoo +19 more