Nothing Special   »   [go: up one dir, main page]

Skip to main content

Part of the book series: Signals and Communication Technology ((SCT))

Abstract

Rethinking the fundamental network architecture seems to be able to solve some known architectural security problems of the existing internet, but proposals are also investigated more thoroughly from the security angle overall. The information-centric approach of 4WARD is built on the concept of securing information rather than locations and paths used for information transit. Doing so, the security principles based on ownership and controlling access at the originating source become challenged. At the same time, moving intelligence into the network itself challenges the underlying assumption of having an Internet consisting of neutral, dumb, and fundamentally cooperating and trusting autonomous domains. 4WARD states the security principles necessary for dynamical management of virtualized, largely self-configuring entities having specific properties. The specific security implementation choices necessary for network design, transport, routing, lookup, privacy, accountability, caching and monitoring are part of the design process, for which 4WARD contributes functional descriptions and the concept of a design repository. 4WARD acknowledges and considers the business and governmental control interests that will heavily influence the security direction into which the future network evolves.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. D. Atkins, R. Austein, Threat Analysis of the Domain Name System (DNS), RFC 3833 (Informational) (August 2004)

    Google Scholar 

  2. Chord, http://pdos.csail.mit.edu/chord/

  3. B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, T. Koponen, M. Chawla, I. Stoica, A data-oriented (and beyond) network architecture, in Proc. ACM SIGCOMM, Kyoto, Japan, August 2007

    Google Scholar 

  4. I. Damgård, M. Fitzi, E. Kiltz, J.B. Nielsen, T. Toft, Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits, and exponentiation, in TCC ed. by S. Halevi, T. Rabin. Lecture Notes in Computer Science, vol. 3876 (Springer, Berlin, 2006), pp. 285–304

    Google Scholar 

  5. J. Day, Patterns in Network Architecture: A Return to Fundamentals (Pearson Education, Upper Saddle River, 2008)

    Google Scholar 

  6. Digital Object Architecture (DOA): Handle, http://www.handle.net/

  7. DNS security extensions, http://www.dnssec.net/

  8. EU Directive 2006/24/EC, http://www.ericsson.com/solutions/news/2009/q1/090202-adrs.shtml

  9. J. Girão, R.L. Aguiar, A. Sarma, A. Matos, Virtual identity framework for telecom infrastructures. Wirel. Pers. Commun. 45, 521–543 (2008)

    Article  Google Scholar 

  10. Global Environment for Network Innovations, http://www.geni.net/

  11. ICANN, Internet Corporation for Assigned Names and Numbers, http://en.wikipedia.org/wiki/ICANN, http://www.icann.org/

  12. IESG IAB, IETF Policy on Wiretapping, RFC 2804 (Informational) (May 2000)

    Google Scholar 

  13. I. Ioannidis, M. Blaze, J. Feigenbaum, A. Keromytis, The Keynote Trust-Management System Version 2, RFC 2704 (Informational) (September 1999)

    Google Scholar 

  14. G. Kreitz, M. Dam, D. Wikström, Practical private information aggregation in large networks, in Proc. NordSec 2010. Springer Lectures Notes in Computer Science (in press)

    Google Scholar 

  15. M. Larson, D. Massey, R. Arends, R. Austein, S. Rose, Protocol Modifications for the DNS Security Extensions, RFC 4035 (Standards Track) (March 2005)

    Google Scholar 

  16. M. Larson, D. Massey, R. Arends, R. Austein, S. Rose, DNS Security Introduction and Requirements, RFC 4033 (Standards Track) (March 2005)

    Google Scholar 

  17. M. Larson, D. Massey, R. Arends, R. Austein, S. Rose, Resource Records for the DNS Security Extensions, RFC 4034 (Standards Track) (March 2005)

    Google Scholar 

  18. A.A. Levy, H.M. Levy, R. Geambasu, T. Kohno, Vanish: Increasing data privacy with self-destructing data, in Usenix Security Symposium 2009, Montreal, Canada, 2009

    Google Scholar 

  19. Metasploit—Penetration Testing Resources, http://www.metasploit.com/

  20. F. Monrose, G. MacManus, J. Mason, S. Small, English Shellcode, in ACM CCS09, Nov 9–13, 2009, Chicago, IL, USA

    Google Scholar 

  21. New ETSI standard for EU-compliant electronic signatures, http://www.etsi.org/website/newsandevents/200909_electronicsignature.aspx

  22. OAuth, An open protocol to allow secure API authorization, http://oauth.net/

  23. Onion routing and Tor, http://en.wikipedia.org/wiki/Onion_routing

  24. OpenID, The OpenID Foundation is an international non-profit organization, http://openid.net/

  25. PARC, http://mags.acm.org/queue/200901/?pg=8

  26. Platform for Privacy Preferences (P3P) Project, http://www.w3.org/P3P/

  27. PSIRP, Publish–Subscribe Internet Routing Paradigm, http://psirp.org/publications

  28. Rochester Institute of Technology: Floating Cloud Tiered Internet Architecture, see http://www.networkworld.com/news/2010/010410-outlook-vision.html

  29. R. Schell, M. Thompson, Platform security: What is lacking (January 2000)

    Google Scholar 

  30. J.L. Simmons, Buying You—The Government’s Use of Fourth-Parties to Launder Data About “the People”, http://www.joshualsimmons.com

  31. SPKI Certificate Theory, http://www.ietf.org/rfc/rfc2693.txt, https://wiki.tools.ietf.org/html/rfc2692

  32. Stanford Clean Slate, OpenFlow, http://cleanslate.stanford.edu/, http://www.openflowswitch.org/

  33. The US Safe Harbor—Fact or Fiction? (2008), http://www.galexia.com/public/research/assets/

  34. U.S. European Union Safe Harbor Framework, http://www.export.gov/safeharbor

  35. Web ontology language, http://www.w3.org/2001/sw/

  36. WHOIS domain search, http://www.ietf.org/rfc/rfc3912.txt

  37. P. Zimmermann, Zfone is a new secure VoIP phone software product: Zfone uses a new protocol called ZRTP, http://zfoneproject.com

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Göran Schultz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

Schultz, G. (2011). Security Aspects and Principles. In: Correia, L., Abramowicz, H., Johnsson, M., Wünstel, K. (eds) Architecture and Design for the Future Internet. Signals and Communication Technology. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-9346-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-9346-2_6

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-9345-5

  • Online ISBN: 978-90-481-9346-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics