Open Access
Security Architecture for the Internet Protocol
R. Atkinson
- Vol. 1825, pp 1-101
Reads0
Chats0
TLDR
This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).Abstract:
This document describes an updated version of the "Security
Architecture for IP", which is designed to provide security services
for traffic at the IP layer. This document obsoletes RFC 2401
(November 1998). [STANDARDS-TRACK]read more
Citations
More filters
Journal ArticleDOI
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
Angelos Stavrou,Debra L. Cook,William G. Morein,Angelos D. Keromytis,Vishal Misra,Dan Rubenstein +5 more
TL;DR: This work presents WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack, and extends this system with a credential-based micropayment scheme that combines access control and payment authorization in one operation.
Book ChapterDOI
YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems
Patrick P. Tsang,Sean W. Smith +1 more
TL;DR: A bump-in-the-wire (BITW) solution that retrofits security into time-critical communications over bandwidth-limited serial links between devices in legacy Supervisory Control and Data Acquisition systems, and yet incurs minimal end-to-end communication latency.
Proceedings ArticleDOI
Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol
Sotirios Katsikeas,Konstantinos Fysarakis,Andreas Miaoudakis,Amaury Van Bemten,Ioannis G. Askoxylakis,Ioannis Papaefstathiou,Anargyros Plemenos +6 more
TL;DR: This paper highlights the Message Queue Telemetry Transport (MQTT) as a lightweight protocol suitable for the industrial domain, presenting a comprehensive evaluation of different security mechanisms that could be used to protect the MQTT-enabled interactions on a real testbed of wireless sensor motes.
Journal ArticleDOI
SeDAX: A Scalable, Resilient, and Secure Platform for Smart Grid Communications
TL;DR: The design details of the Se DAX platform are described and empirical results on the performance of SeDAX as compared with other geometric-based alternatives such as Geographic Hash Table (GHT) forwarding and Content Addressable Networking (CAN).
Patent
Dynamic categorization of applications for network access in a mobile network
Michael Luna,Ross Bott +1 more
TL;DR: The concept of black, white and grey applications was introduced in this paper, where applications can be categorized into one of multiple categories that define restrictions on the application's access to the wireless network or cellular network.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Key words for use in RFCs to Indicate Requirement Levels
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Journal ArticleDOI
Using encryption for authentication in large networks of computers
TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Internet Protocol, Version 6 (IPv6) Specification
S. Deering,R. Hinden +1 more
TL;DR: In this paper, the authors specify version 6 of the Internet Protocol (IPv6), also referred to as IP Next Generation or IPng, and propose a new protocol called IPng.
Internet Protocol
TL;DR: Along with TCP, IP represents the heart of the Internet protocols and has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through an internetwork; and providing fragmentation and reassembly of data links to support data links with different maximum transmission unit (MTU) sizes.