From protecting protocols to layers: Designing, implementing and experimenting with security policies in RINA

Data de publicació

2016-05-25



Resum

Current Internet security is complex, expensive and ineffective. The usual argument is that the TCP/IP protocol suite was not designed having security in mind and security mechanisms have been added as add-ons or separate protocols. We argue that fundamental limitations in the Internet architecture are a major factor contributing to the insecurity of the Net. In this paper we explore the security properties of the Recursive InterNetwork Architecture, analyzing the principles that make RINA networks inherently more secure than TCP/IP-based ones. We perform the specification, implementation and experimental evaluation of the first authentication and SDU protection policies for RINA networks. RINA's approach to securing layers instead of protocols increases the security of networks, while reducing the complexity and cost of providing security.

Tipus de document

Objecte de conferència

Llengua

Anglès

Paraules clau

RINA; Software Networks

Pàgines

6 p.

Publicat per

IEEE International Conference on Communications (ICC), Kuala Lumpur, 2016.

Citació recomanada

Aquesta citació s'ha generat automàticament.

Documents

rina-pristine-security-icc16.pdf

408.5Kb

 

Drets

L'accés als continguts d'aquest document queda condicionat a l'acceptació de les condicions d'ús establertes per la següent llicència Creative Commons:http://creativecommons.org/licenses/by/4.0/

© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Aquest element apareix en la col·lecció o col·leccions següent(s)