Security

An Holistic Approach to Public/Private - Key Based Security in Locator/Identifier - Split Architectures

Date Added: Apr 2011
Format: PDF

Network security has become an essential business requirement over the past few years. As this demand will increase even more in the future, researchers agree that security must be a key element for any novel Next Generation Internet architecture. Contrary to today's add - on approach to security, the mechanisms must be anchored in the overall architecture and should be a major concern already during the design phase. In this paper, the authors present an approach based on the private/public - key principle for almost any locator/identifier - split architecture. They suggest to extend the mapping system to also serve as public - key infrastructure and recommend to use smart cards for the client side key management.