2017
DOI: 10.1007/978-3-319-67080-5
|View full text |Cite
|
Sign up to set email alerts
|

SCION: A Secure Internet Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 49 publications
(48 citation statements)
references
References 0 publications
0
48
0
Order By: Relevance
“…Although proposed since over 20 years [26], the deployment of DNSSEC can still be considered to be in its early stages [65,68]. Bearing this and efforts to further deploy HTTPS in mind [59], it is questionable if the WebPKI is going to be replaced by more promising, clean-slate architectures such as SCION in the near future [11,54]. This assumption leads to the question how to handle the risks which come along with the flawed WebPKI architecture as is?…”
Section: Resultsmentioning
confidence: 99%
“…Although proposed since over 20 years [26], the deployment of DNSSEC can still be considered to be in its early stages [65,68]. Bearing this and efforts to further deploy HTTPS in mind [59], it is questionable if the WebPKI is going to be replaced by more promising, clean-slate architectures such as SCION in the near future [11,54]. This assumption leads to the question how to handle the risks which come along with the flawed WebPKI architecture as is?…”
Section: Resultsmentioning
confidence: 99%
“…We implement a prototype SVLAN on top of SCION [44], a future Internet architecture that supports native segment routing, for testing the general functionality and performance. In addition, since SCION is designed for inter-domain segment routing, we expand the SCION data plane with an SVLAN extension header that conveys the intra-domain path segment and authorization proof, enabling communication at an endhost (and even application) granularity.…”
Section: Methodsmentioning
confidence: 99%
“…Figure 4 details the SVLAN extension header structure. The header begins with three bytes of general extension header fields [44]. SecType specifies the type of MAC that are used for generating the authorization proof, such as CMAC or HMAC.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This rate of connectivity interruptions would introduce a significant overhead for BGP speakers and negatively impact BGP convergence times. An important next step in our research agenda is to explore recent trends in networking (e.g., path-aware networking) and alternate interdomain networking architectures that improve on today's architecture [29].…”
Section: Effect On Bgp Announcementsmentioning
confidence: 99%