Abstract
Adhering to the end-to-end principle even more than the current Internet yields highly available point-to-point communication.
- Abadi, M., Birrell, A., Mironov, I., Wobber, T., and Xie, Y. Global authentication in an untrustworthy world. In Proceedings of the 14th Workshop on Hot Topics in Operating Systems (Santa Ana Pueblo, NM, May 13--15). Usenix Association, Berkeley, CA, 2013. Google ScholarDigital Library
- American Registry for Internet Numbers. Resource Public Key Infrastructure (RPKI); https://www.arin.net/resources/rpki/Google Scholar
- Andersen, D.G., Balakrishnan, H., Feamster, N., Koponen, T., Moon, D., and Shenker, S. Accountable Internet Protocol (AIP). In Proceedings of ACM SIGCOMM (Seattle, WA, Aug. 17--22). ACM Press, New York, 2008. Google ScholarDigital Library
- Andersen, D.G., Balakrishnan, H., Kaashoek, M.F., and Morris, R. Resilient overlay networks. In Proceedings of the ACM Symposium on Operating Systems Principles (Chateau Lake Louise, Banff, Canada, Oct. 21--24). ACM Press, New York, 2001. Google ScholarDigital Library
- Arends, R., Austein, R., Larson, M., Massey, D., and Rose, S. DNS Security Introduction and Requirements. RFC 4033 (Proposed Standard), 2005; https://www.ietf.org/rfc/rfc4033.txtGoogle Scholar
- Basescu, C., Reischuk, R.M., Szalachowski, P., Perrig, A., Zhang, Y., Hsiao, H.-C., Kubota, A., and Urakawa, J. SIBRA: Scalable Internet Bandwidth Reservation Architecture. In Proceedings of Network and Distributed System Security Symposium (San Diego, CA, Feb. 21--24). Internet Society, Reston, VA, 2016.Google ScholarCross Ref
- Basin, D., Cremers, C., Kim, T. H.-J., Perrig, A., Sasse, R., and Szalachowski, P. ARPKI: Attack Resilient Public-Key Infrastructure. In Proceedings of the ACM Conference on Computer and Communications Security (Scottsdale, AZ, Nov. 3--7). ACM Press, New York, 2014. Google ScholarDigital Library
- BBC News. Asia communications hit by quake. Dec. 27, 2006; http://news.bbc.co.uk/2/hi/asia-pacific/6211451.stmGoogle Scholar
- Brown, M. Pakistan Hijacks YouTube; http://research.dyn.com/2008/02/pakistan-hijacks-youtube-1/Google Scholar
- Chen, C., Asoni, D., Barrera, D., Danezis, G., and Perrig, A. HORNET: High-speed onion routing at the network layer. In Proceedings of the ACM Conference on Computer and Communications Security (Denver, CO, Oct. 12--16). ACM Press, New York, 2015. Google ScholarDigital Library
- Dübendorfer, T., Wagner, A., and Plattner, B. An economic damage model for large-scale Internet attacks. In Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (University of Modena and Reggio Emilia, Italy, June 14--16). IEEE Press, 2004. Google ScholarDigital Library
- Electronic Frontier Foundation. SSL Observatory, 2010; https://www.eff.org/observatoryGoogle Scholar
- Farinacci, D., Fuller, V., Meyer, D., and Lewis, D. The Locator/ID Separation Protocol (LISP). RFC 6830, 2013; https://tools.ietf.org/html/rfc6830Google Scholar
- Han, D., Anand, A., Dogar, F., Li, B., Lim, H., Machado, M., Mukundan, A., Wu, W., Akella, A., Andersen, D.G., Byers, J.W., Seshan, S., and Steenkiste, P. XIA: Efficient support for evolvable internetworking. In Proceedings of the Ninth USENIX Symposium on Networked Systems Design and Implementation (San Jose, CA, Apr. 25--27). USENIX Association, Berkeley, CA, 2012. Google ScholarDigital Library
- Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., and Braynard, R.L. Networking named content. In Proceedings of the Fifth International Conference on Emerging Networking Experiments and Technologies (Rome, Italy, Dec. 1--4). ACM Press, New York, 2009. Google ScholarDigital Library
- Katz-Bassett, E., Scott, C., Chones, D., Cunha, I., Valancius, V., Feamster, N., Madhyastha, H., Anderson, T., and Krishnamurthy, A. LIFEGUARD: Practical repair of persistent route failures. In Proceedings of ACM SIGCOMM (Helsinki, Finland, Aug. 13--17). ACM Press, New York, 2012. Google ScholarDigital Library
- Kim, T. H., Basescu, C., Jia, L., Lee, S.B., Hu, Y., and Perrig, A. Lightweight source authentication and path validation. In Proceedings of ACM SIGCOMM (Chicago, IL, Aug. 17--22). ACM Press, New York, 2014. Google ScholarDigital Library
- Kushman, N., Kandula, S., and Katabi, D. Can you hear me now? It must be BGP. ACM SIGCOMM Computer Communication Review 37, 2 (Apr. 2007), 75--84. Google ScholarDigital Library
- Lepinski, M. and Turner, S. An Overview of BGPsec. IETF draft, May 8, 2012; http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-overview-02Google Scholar
- Matsumoto, S., Reischuk, R.M., Szalachowski, P., Kim, T.H.-J., and Perrig, A. Authentication challenges in a global environment. ACM Transactions on Privacy and Security 20, 1 (Feb. 2017), 1--34. Google ScholarDigital Library
- Palo Alto Research Center. The CCNx Project (Content-Centric Networking); http://blogs.parc.com/ccnx/Google Scholar
- Perrig, A., Szalachowski, P., Reischuk, R.M., and Chuat, L. SCION: A Secure Internet Architecture. Springer, Berlin, Germany, 2017.Google ScholarCross Ref
- Raychaudhuri, D., Nagaraja, K., and Venkataramani, A. MobilityFirst: A robust and trustworthy mobility-centric architecture for the future Internet. ACM SIGMOBILE Mobile Computing and Communications Review 16, 3 (July 2012), 2--13. Google ScholarDigital Library
- Sahoo, A., Kant, K., and Mohapatra, P. BGP convergence delay under large-scale failures: Characterization and solutions. Computer Communications 32, 7 (May 2009), 1207--1218. Google ScholarDigital Library
- Saltzer, J.H., Reed, D.P., and Clark, D.D. End-to-end arguments in system design. ACM Transactions on Computer Systems 2, 4 (Nov. 1984), 277--288. Google ScholarDigital Library
- Schuchard, M., Vasserman, E.Y., Mohaisen, A., Kune, D.F., Hopper, N., and Kim, Y. Losing control of the Internet: Using the data plane to attack the control plane. In Proceedings of the Network and Distributed System Security Symposium (San Diego, CA, Feb. 6--9). Internet Society, Reston, VA, 2011.Google Scholar
- Toonk, A. Massive route leak causes Internet slowdown. BGPmon, June 12, 2015; http://www.bgpmon.net/massive-route-leak-cause-internet-slowdown/Google Scholar
- Zhang, X., Hsiao, H.-C., Hasker, G., Chan, H., Perrig, A., and Andersen, D.G. SCION: Scalability, control, and isolation on next-generation networks. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA, May 22--25). IEEE Press, 2011. Google ScholarDigital Library
Index Terms
- The SCION internet architecture
Recommendations
Security Architecture of Computer Communication System Based on Internet of Things
ICASIT 2020: Proceedings of the 2020 International Conference on Aviation Safety and Information TechnologyIn large-scale service collaboration environment, security and privacy protection are the main factors affecting the development of IoT service applications. The security and privacy requirements of IoT services mainly focus on three aspects: secure ...
Comments