Proceedings of the 2008 ACM CoNEXT Conference on - CONEXT '08 2008
DOI: 10.1145/1544012.1544079
|View full text |Cite
|
Sign up to set email alerts
|

Networking is IPC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 85 publications
(10 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…In addition, comprehensive studies such as [17] on IoT security have confirmed that many issues stem from the currently-employed network stack protocols of IoT devices and their interoperability issues with the Internet. There are some major flaws with IP: the concept of scope of a layer is not used correctly [18], as it has been diluted by gradual updates. Although some research work (e.g.…”
Section: Ip-based Stackmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, comprehensive studies such as [17] on IoT security have confirmed that many issues stem from the currently-employed network stack protocols of IoT devices and their interoperability issues with the Internet. There are some major flaws with IP: the concept of scope of a layer is not used correctly [18], as it has been diluted by gradual updates. Although some research work (e.g.…”
Section: Ip-based Stackmentioning
confidence: 99%
“…This means that even if some DIFs are compromised, the integrity of the whole network remains intact. This is a critical benefit in IoT networks where a vast number of diverse devices, each with their own potential vulnerabilities, are interconnected [18]. • Enhanced Scalability: The recursive nature of DIFs means that the same security mechanisms can be applied at different scales, from small local networks to large-scale global networks.…”
Section: Multi-layer Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…The DRUID architecture is based on the idea that all protocols can be expressed as varying recursive instances of a single, universal recursive block of code and data, a combined perspective of the metaprotocol (MP) of USC/ISI's Recursive Network Architecture (RNA) [56,58,65] and the distributed IPC facility (DIF) of Boston University's (BU) Recursive InterNet Architecture (RINA) [15,16,44] (Fig. 5).…”
Section: Recursive Blockmentioning
confidence: 99%
“…This includes its recursive block, called the Distributed IPC Facility (DIF) [16], the IPC mechanism and associated IPC management, as well as the Data Transfer Protocol (DTP) with tightly bound mechanisms, and the loosely-bound Data Transfer Control Protocol (DTCP). DTP/DTCP are modeled after the soft-state Delta-t transmission protocol [24,66].…”
Section: Current Statusmentioning
confidence: 99%