2017
DOI: 10.1145/3007208
|View full text |Cite
|
Sign up to set email alerts
|

Authentication Challenges in a Global Environment

Abstract: In this article, we address the problem of scaling authentication for naming, routing, and end-entity (EE) certification to a global environment in which authentication policies and users’ sets of trust roots vary widely. The current mechanisms for authenticating names (DNSSEC), routes (BGPSEC), and EE certificates (TLS) do not support a coexistence of authentication policies, affect the entire Internet when compromised, cannot update trust root information efficiently, and do not provide users with the abilit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 29 publications
0
7
0
Order By: Relevance
“…Matsumoto et al [26] proposed two important properties: scoped authority and global authentication. These properties enable EEs who trust each other to communicate even if they are located in separate domains.…”
Section: A Main Principlementioning
confidence: 99%
See 1 more Smart Citation
“…Matsumoto et al [26] proposed two important properties: scoped authority and global authentication. These properties enable EEs who trust each other to communicate even if they are located in separate domains.…”
Section: A Main Principlementioning
confidence: 99%
“…In [26], the domains can represent groups of various scales, such as companies, conglomerates, or countries, but overconcentration of trust will occur in groups where PKI systems are built using the hierarchical model. To prevent the overconcentration of trust, we build trust points at service levels such that the trust points do not span multiple services.…”
Section: A Main Principlementioning
confidence: 99%
“…It is worth noting that, in recent years many research efforts have been made on new types of network addresses, most of which emphasized self-certifying [19], [20]; this has been considered to be the trends in the development of communication networks. The self-certifying identifiers have been widely adopted in a variety of distributed systems.…”
Section: B Self-certifying Addressmentioning
confidence: 99%
“…Currently, networks rely on practical reactive mechanisms to try to defend against prefix hijacking, since proposed proactive mechanisms [38], [39], [42], [43], [64] (e.g., RPKI) are fully efficient only when globally deployed, and operators are reluctant to deploy them due to associated technical and financial costs [27], [45], [49]. Defending against hijacking reactively consists of two steps: detection and mitigation.…”
Section: Introductionmentioning
confidence: 99%