skip to main content
research-article
Free Access

The SCION internet architecture

Published:24 May 2017Publication History
Skip Abstract Section

Abstract

Adhering to the end-to-end principle even more than the current Internet yields highly available point-to-point communication.

References

  1. Abadi, M., Birrell, A., Mironov, I., Wobber, T., and Xie, Y. Global authentication in an untrustworthy world. In Proceedings of the 14th Workshop on Hot Topics in Operating Systems (Santa Ana Pueblo, NM, May 13--15). Usenix Association, Berkeley, CA, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. American Registry for Internet Numbers. Resource Public Key Infrastructure (RPKI); https://www.arin.net/resources/rpki/Google ScholarGoogle Scholar
  3. Andersen, D.G., Balakrishnan, H., Feamster, N., Koponen, T., Moon, D., and Shenker, S. Accountable Internet Protocol (AIP). In Proceedings of ACM SIGCOMM (Seattle, WA, Aug. 17--22). ACM Press, New York, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Andersen, D.G., Balakrishnan, H., Kaashoek, M.F., and Morris, R. Resilient overlay networks. In Proceedings of the ACM Symposium on Operating Systems Principles (Chateau Lake Louise, Banff, Canada, Oct. 21--24). ACM Press, New York, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Arends, R., Austein, R., Larson, M., Massey, D., and Rose, S. DNS Security Introduction and Requirements. RFC 4033 (Proposed Standard), 2005; https://www.ietf.org/rfc/rfc4033.txtGoogle ScholarGoogle Scholar
  6. Basescu, C., Reischuk, R.M., Szalachowski, P., Perrig, A., Zhang, Y., Hsiao, H.-C., Kubota, A., and Urakawa, J. SIBRA: Scalable Internet Bandwidth Reservation Architecture. In Proceedings of Network and Distributed System Security Symposium (San Diego, CA, Feb. 21--24). Internet Society, Reston, VA, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  7. Basin, D., Cremers, C., Kim, T. H.-J., Perrig, A., Sasse, R., and Szalachowski, P. ARPKI: Attack Resilient Public-Key Infrastructure. In Proceedings of the ACM Conference on Computer and Communications Security (Scottsdale, AZ, Nov. 3--7). ACM Press, New York, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. BBC News. Asia communications hit by quake. Dec. 27, 2006; http://news.bbc.co.uk/2/hi/asia-pacific/6211451.stmGoogle ScholarGoogle Scholar
  9. Brown, M. Pakistan Hijacks YouTube; http://research.dyn.com/2008/02/pakistan-hijacks-youtube-1/Google ScholarGoogle Scholar
  10. Chen, C., Asoni, D., Barrera, D., Danezis, G., and Perrig, A. HORNET: High-speed onion routing at the network layer. In Proceedings of the ACM Conference on Computer and Communications Security (Denver, CO, Oct. 12--16). ACM Press, New York, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Dübendorfer, T., Wagner, A., and Plattner, B. An economic damage model for large-scale Internet attacks. In Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (University of Modena and Reggio Emilia, Italy, June 14--16). IEEE Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Electronic Frontier Foundation. SSL Observatory, 2010; https://www.eff.org/observatoryGoogle ScholarGoogle Scholar
  13. Farinacci, D., Fuller, V., Meyer, D., and Lewis, D. The Locator/ID Separation Protocol (LISP). RFC 6830, 2013; https://tools.ietf.org/html/rfc6830Google ScholarGoogle Scholar
  14. Han, D., Anand, A., Dogar, F., Li, B., Lim, H., Machado, M., Mukundan, A., Wu, W., Akella, A., Andersen, D.G., Byers, J.W., Seshan, S., and Steenkiste, P. XIA: Efficient support for evolvable internetworking. In Proceedings of the Ninth USENIX Symposium on Networked Systems Design and Implementation (San Jose, CA, Apr. 25--27). USENIX Association, Berkeley, CA, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., and Braynard, R.L. Networking named content. In Proceedings of the Fifth International Conference on Emerging Networking Experiments and Technologies (Rome, Italy, Dec. 1--4). ACM Press, New York, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Katz-Bassett, E., Scott, C., Chones, D., Cunha, I., Valancius, V., Feamster, N., Madhyastha, H., Anderson, T., and Krishnamurthy, A. LIFEGUARD: Practical repair of persistent route failures. In Proceedings of ACM SIGCOMM (Helsinki, Finland, Aug. 13--17). ACM Press, New York, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Kim, T. H., Basescu, C., Jia, L., Lee, S.B., Hu, Y., and Perrig, A. Lightweight source authentication and path validation. In Proceedings of ACM SIGCOMM (Chicago, IL, Aug. 17--22). ACM Press, New York, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Kushman, N., Kandula, S., and Katabi, D. Can you hear me now? It must be BGP. ACM SIGCOMM Computer Communication Review 37, 2 (Apr. 2007), 75--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Lepinski, M. and Turner, S. An Overview of BGPsec. IETF draft, May 8, 2012; http://tools.ietf.org/html/draft-ietf-sidr-bgpsec-overview-02Google ScholarGoogle Scholar
  20. Matsumoto, S., Reischuk, R.M., Szalachowski, P., Kim, T.H.-J., and Perrig, A. Authentication challenges in a global environment. ACM Transactions on Privacy and Security 20, 1 (Feb. 2017), 1--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Palo Alto Research Center. The CCNx Project (Content-Centric Networking); http://blogs.parc.com/ccnx/Google ScholarGoogle Scholar
  22. Perrig, A., Szalachowski, P., Reischuk, R.M., and Chuat, L. SCION: A Secure Internet Architecture. Springer, Berlin, Germany, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  23. Raychaudhuri, D., Nagaraja, K., and Venkataramani, A. MobilityFirst: A robust and trustworthy mobility-centric architecture for the future Internet. ACM SIGMOBILE Mobile Computing and Communications Review 16, 3 (July 2012), 2--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Sahoo, A., Kant, K., and Mohapatra, P. BGP convergence delay under large-scale failures: Characterization and solutions. Computer Communications 32, 7 (May 2009), 1207--1218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Saltzer, J.H., Reed, D.P., and Clark, D.D. End-to-end arguments in system design. ACM Transactions on Computer Systems 2, 4 (Nov. 1984), 277--288. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Schuchard, M., Vasserman, E.Y., Mohaisen, A., Kune, D.F., Hopper, N., and Kim, Y. Losing control of the Internet: Using the data plane to attack the control plane. In Proceedings of the Network and Distributed System Security Symposium (San Diego, CA, Feb. 6--9). Internet Society, Reston, VA, 2011.Google ScholarGoogle Scholar
  27. Toonk, A. Massive route leak causes Internet slowdown. BGPmon, June 12, 2015; http://www.bgpmon.net/massive-route-leak-cause-internet-slowdown/Google ScholarGoogle Scholar
  28. Zhang, X., Hsiao, H.-C., Hasker, G., Chan, H., Perrig, A., and Andersen, D.G. SCION: Scalability, control, and isolation on next-generation networks. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA, May 22--25). IEEE Press, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The SCION internet architecture

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 60, Issue 6
              June 2017
              93 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/3098997
              • Editor:
              • Moshe Y. Vardi
              Issue’s Table of Contents

              Copyright © 2017 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 24 May 2017

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Popular
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format