您好,欢迎光临本网站![请登录][注册会员]  
文件名称: SCION: A Secure Internet Architecture
  所属分类: 网络安全
  开发工具:
  文件大小: 8mb
  下载次数: 0
  上传时间: 2019-04-05
  提 供 者: al***
 详细说明:This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust information, multipath communication, scalable quality-of-service guarantees, and efficient forwarding. The book includes functional specifications of the network elements, communication protocols among these elements, data structures, and configuration files. In particular, the book offers a specification of a working prototype. The authors provide a comprehensive description of the main design features for achieving a secure Internet architecture. They facilitate the reader throughout, structuring the book so that the technical detail gradually increases, and supporting the text with a glossary, an index, a list of abbreviations, answers to frequently asked questions, and special highlighting for examples and for sections that explain important research, engineering, and deployment features. The book is suitable for researchers, practitioners, and graduate students who are interested in network security.Moreinformationaboutthisseriesathttp://www.springer.com/series/4752 Adrian Perrig. Pawel Szalachowski Raphael m. reischuk. Laurent chuat SCion:A Secure internet Architecture ringer Adrian perrig Raphael m. reischuk Network Security Group Network Security Group ETH Zurich ETH Zurich Zurich Zi Switzerland Switzerland Pawel szalachowski Laurent chua Network Security Group Network Security Group ETH Zurich ETH Zurich Zurich Zurich Switzerland Switzerland ISSN1619-7100 issn 2197-845X (electronic) Information Security and Cryptography ISBN978-3-319670799 SBN978-3-319-67080-5( e Book) https:/doi.org,/10.1007/978-3-319-67080-5 Library of Congress Control Number: 2017955641 o Springer International Publishing AG 2017 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed The use of general descriptive names, registered names, trademarks, service marks, etc in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer International Publishing AG The registered company address is: Gewerbestrasse ll, 6330 Cham, Switzerland Thank you for your unwavering support Love, forever. Adrian To Henio For all these sleepless nights Pawet To my family and those who supported me along my way. Raphael O Me For your patience and encouragement Laurent Contents oreo X ref face XV verve 1 Introduction 1.I Todays Internet Goals of a secure Internet architecture 3 Future Internet Architectures 13 2 The SCION Architecture 2.1 Control plane 2.2 Data plane ecurity Aspects 27 2.4 Use Cases 31 Incentives for Stakeholders 34 6 Deployment 2.7 Extensions 39 2. 8 Main Contributions 39 3 Isolation Domains(ISDs) 43 3. 1 Why Isolation 43 3.2 The ISD Corel 3.3 Coordination Among ISD 48 3.4 Name Resolution 48 3.5 ISD Governance Models 51 3.6 Nested Isolation Domains l SCION in Detaill 59 4 Authentication Infrastructure 61 耳. Overview 4.2 Control-Plane Authentication 68 4.3 Name Authentication 83 4.4 End-Entity authentication 86 V11 Contents 5 SD Coordination 93 5.1 Motivation and Objectives 94 5.2 Announcing and Discovering New ISDs 3 Local resolution of conficts 6 Name Resolution 101 6. 1 Background 102 6.2 Name Resolution Architecture 104 6. 3 Naming Information Model 106 6.4 The RAINS Protocol 114 6.5 The Naming Consistency Observer(ncO 7 Control Plane 119 7.1 Path Exploration and Registration 119 7.2 Path Lookup 13 7.3 Secure Path Revocation ..,,,,,..138 1.4 Failure Resilience and Service Discovery 146 7.5 AS-Level Anycast Service 153 1.6 SCION Control Message Protocol (SCMP) 155 7.7 Time Synchronization 159 8 Data Plane 161 8.1 Path Format 162 8.2 Creation of Forwarding paths 164 8.3 Efficient Path Construction 174 9 Host Structure 179 9. 1 SCION Dispatcher 179 9.2 SCION Daemon 183 19.3 Transmission Control Protocol (TCP/SCION) 185 9.4 SCION Stream Protocol (SSP).. 188 10 Deployment and Operation 191 0.1 ISP Deployment 191 10.2 End-Domain Deployment 199 0.3 The SCION-IP Gateway(SIG) 20l 10.4 How to Try out SCIOn 211 10.5 SCION AS Management Framework 215 10.6 Deploying a New as 218 10.7 The scionlab experimentation environment 220 10.8 Example: Life of a SCion Data Packet 223 10.9 SCION Path Policy 230 Contents I Extensions 241 11 SIBRA 243 11. Motivation and Introduction 244 11. 2 Goals and Adversary model 245 11.3 Design Overview 247 11.4 SIBRA Core Path 250 11.5 SIBRA Steady Paths 259 1.6 SIBRA Ephemeral paths 1.7 Priority Traffic Monitoring and polcing/ 261 268 11.9 Discussion 273 11.10 Further reading 276 12 OPT and DRKey 279 12. 1 Introduction 280 12.2 OPT Problem Definition 281 12.3 OPT Design Overview 283 12.4 OPT Protocol Description 286 12.5 Dynamically Recreatable Keys(drEy) 291 V Analysis and Evaluation 299 13 Security analysis 301 13. 1 Security goals 302 13.2 Threat Modell 304 3.3 Software Securit 305 13.4 Control-Plane Path Manipulation 307 3.5 Data-Plane Path manipulation 312 6. 6 Censorship and surveillance 318 3.7 Attacks Against Availability 320 13.8 Absence of Kill Switches. 325 13.9 Resilience to Path hijacking 327 13.10 Summary 330 14 Power Consumption 331 14.1 Modeling Power Consumption of an FIA router 332 14.2 Simulation 334 Specification 339 15 Packet and Message formats 341 15.1 SCION Packet 341 Contents 1 5.2 Control plane 355 15.3 PCB and Path Segment 356 4 Path Management messages 361 15.5 PKI Interactions 15.6 SCMP Packet 363 16 Configuration File Formats 369 16. 1 Trust Root Configuration 369 16.2 AS Certificates 370 16.3 Discovery Service Configuration 374 16. 4 Router, Server, and End-Host Configuration 376 7 Cryptographic algorithms 381 17.1 Algorithm Agility 381 17.2 Symmetric Primitive 384 17.3 Asymmetric Primitives 385 17. 4 Post-Quantum Cryptography 386 Bibliography 387 Frequently Asked Questions 409 Glossary 417 Abbreviations 421 ndex 423
(系统自动生成,下载前可以参看下载内容)

下载文件列表

相关说明

  • 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
  • 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度
  • 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
  • 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
  • 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
  • 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.
 输入关键字,在本站1000多万海量源码库中尽情搜索: