A credential-based data path architecture for assurable global networking

被引:0
|
作者
Wolf, Tilman [1 ]
机构
[1] Univ Massachusetts, Dept Elect & Comp Engn, Amherst, MA 01003 USA
来源
2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8 | 2007年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The main limitation for achieving information assurance in current data networks ties in absence of security considerations in the original Internet architecture. This shortcoming leads to the need for a new approach to achieving information assurance in networks. We propose a network architecture that uses credentials in the data path to identify, validate, monitor, and control data flows within the network. The important aspect of this approach is that credentials are tracked on the data path of the network, not just the end-systems, which implies that each and every packet can be audited. We present a credentials design that is based on Bloom filters and can achieve the desired properties to provide data path assurance.
引用
收藏
页码:3051 / 3057
页数:7
相关论文
共 50 条
  • [21] An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
    Li, Chun-Ta
    Weng, Chi-Yao
    Lee, Cheng-Chi
    SENSORS, 2013, 13 (08): : 9589 - 9603
  • [22] Security architecture and mechanisms for global networking
    He, JS
    GLOBAL NETWORKING '97 - 21ST CENTURY COMMUNICATIONS NETWORKS, VOL 1: TECHNOLOGY; ECONOMICS, 1997, : 63 - 69
  • [23] A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
    Ashok Kumar Das
    Peer-to-Peer Networking and Applications, 2016, 9 : 223 - 244
  • [24] VCTP: A Verifiable Credential-based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms
    Mukta, Rahma
    Teh, Rue C.
    Paik, Hye-young
    Lu, Qinghua
    Kanhere, Salil S.
    2023 IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES, DAPPS, 2023, : 109 - +
  • [25] An Overlay Architecture of Global Inter-Data Center Networking for Fast Content Delivery
    Miyao, Yasuhiro
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [26] Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks
    Lee, Tian-Fu
    SENSORS, 2015, 15 (07) : 14960 - 14980
  • [27] Named Data Networking Architecture for VANET
    Raissi, Khadija
    Ben Gouissem, Bechir
    2018 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, EMBEDDED SYSTEMS AND COMMUNICATIONS (IINTEC), 2018, : 12 - 15
  • [28] AT-AND-T DATA NETWORKING ARCHITECTURE
    BOAKYE, KA
    KAUFELD, JC
    PALMER, JW
    AT&T TECHNICAL JOURNAL, 1988, 67 (06): : 23 - 34
  • [29] A persistent web data architecture with named data networking
    Jung, Euihyun
    Lecture Notes in Electrical Engineering, 2015, 373 : 153 - 158
  • [30] Research on the Realization Path and Application of a Data Governance System Based on Data Architecture
    Miao, Fang
    Yang, Wenhui
    Xie, Yan
    Fan, Wenjie
    DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 3 - 19