2020
DOI: 10.1109/access.2020.2974327
|View full text |Cite
|
Sign up to set email alerts
|

MIN: Co-Governing Multi-Identifier Network Architecture and Its Prototype on Operator’s Network

Abstract: IP protocol is the core of TCP/IP network layer. However, since IP address and its Domain Name are allocated and managed by a single agency, there are risks of centralization. The semantic overload of IP address also reduces its scalability and mobility, which further hinders the security. This paper proposes a co-governing Multi-Identifier Network (MIN) architecture that constructs a network layer with parallel coexistence of multiple identifiers, including identity, content, geographic information, and IP ad… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…(5) The sovereignty network can support 5G requirements and provide both wired and wireless data transmission. (6) The security of resources and content data within the sovereignty network should be guaranteed, that is, the sovereignty network should effectively prevent existing network attacks (such as worms and malicious traffic), as well as ensure the stable operation of the system. (7) The production and broadcasting network of radio and television programs can run online in real time.…”
Section: Functional Requirements For Sovereignty Networkmentioning
confidence: 99%
See 4 more Smart Citations
“…(5) The sovereignty network can support 5G requirements and provide both wired and wireless data transmission. (6) The security of resources and content data within the sovereignty network should be guaranteed, that is, the sovereignty network should effectively prevent existing network attacks (such as worms and malicious traffic), as well as ensure the stable operation of the system. (7) The production and broadcasting network of radio and television programs can run online in real time.…”
Section: Functional Requirements For Sovereignty Networkmentioning
confidence: 99%
“…(6) The security of resources and content data within the sovereignty network should be guaranteed, that is, the sovereignty network should effectively prevent existing network attacks (such as worms and malicious traffic), as well as ensure the stable operation of the system. (7) The production and broadcasting network of radio and television programs can run online in real time. (8) The sovereignty network can provide a better user experience for watching videos, such as faster video acquisition rate and more stable video playback.…”
Section: Functional Requirements For Sovereignty Networkmentioning
confidence: 99%
See 3 more Smart Citations