Security

An Holistic Approach to Public/Private - Key Based Security in Locator/Identifier - Split Architectures

Free registration required

Executive Summary

Network security has become an essential business requirement over the past few years. As this demand will increase even more in the future, researchers agree that security must be a key element for any novel Next Generation Internet architecture. Contrary to today's add - on approach to security, the mechanisms must be anchored in the overall architecture and should be a major concern already during the design phase. In this paper, the authors present an approach based on the private/public - key principle for almost any locator/identifier - split architecture. They suggest to extend the mapping system to also serve as public - key infrastructure and recommend to use smart cards for the client side key management.

  • Format: PDF
  • Size: 1423.36 KB