From protecting protocols to layers: Designing, implementing and experimenting with security policies in RINA

dc.contributor.author
Grasa, Eduard
dc.contributor.author
Rysavy, Ondrej
dc.contributor.author
Licthner, Ondrej
dc.contributor.author
Asgari, Hamid
dc.contributor.author
Day, John
dc.contributor.author
Chitkushev, Lou
dc.date.accessioned
2019-07-03T07:11:15Z
dc.date.accessioned
2024-09-20T08:14:13Z
dc.date.available
2019-07-03T07:11:15Z
dc.date.available
2024-09-20T08:14:13Z
dc.date.issued
2016-05-25
dc.identifier.uri
http://hdl.handle.net/2072/358252
dc.description.abstract
Current Internet security is complex, expensive and ineffective. The usual argument is that the TCP/IP protocol suite was not designed having security in mind and security mechanisms have been added as add-ons or separate protocols. We argue that fundamental limitations in the Internet architecture are a major factor contributing to the insecurity of the Net. In this paper we explore the security properties of the Recursive InterNetwork Architecture, analyzing the principles that make RINA networks inherently more secure than TCP/IP-based ones. We perform the specification, implementation and experimental evaluation of the first authentication and SDU protection policies for RINA networks. RINA's approach to securing layers instead of protocols increases the security of networks, while reducing the complexity and cost of providing security.
eng
dc.format.extent
6 p.
dc.language.iso
eng
dc.publisher
IEEE International Conference on Communications (ICC), Kuala Lumpur, 2016.
dc.rights
L'accés als continguts d'aquest document queda condicionat a l'acceptació de les condicions d'ús establertes per la següent llicència Creative Commons:http://creativecommons.org/licenses/by/4.0/
dc.rights
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.source
RECERCAT (Dipòsit de la Recerca de Catalunya)
dc.subject.other
RINA
dc.subject.other
Software Networks
dc.title
From protecting protocols to layers: Designing, implementing and experimenting with security policies in RINA
dc.type
info:eu-repo/semantics/conferenceObject
dc.subject.udc
621.3
dc.embargo.terms
cap
dc.identifier.doi
10.1109/ICC.2016.7510780
dc.rights.accessLevel
info:eu-repo/semantics/openAccess


Documents

rina-pristine-security-icc16.pdf

408.5Kb PDF

Aquest element apareix en la col·lecció o col·leccions següent(s)