2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2014
DOI: 10.1109/imis.2014.62
|View full text |Cite
|
Sign up to set email alerts
|

Security of Selected Future Internet Architectures: A Survey

Abstract: The Internet faces many challenges in terms of flexibility (so called IP bottleneck) as well as host-centric addressing, mobility, self-configuration, self-monitoring, and security. Several Future Internet (FI) architectures have been proposed to address these challenges including eXpressive Internet Architecture (XIA), MobilityFirst, Named Data Networking (NDN), NEBULA, and Recursive InterNetwork Architecture (RINA). This paper surveys the security solutions of the FI architectures based on literatures, proto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
20

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(23 citation statements)
references
References 22 publications
(12 reference statements)
0
3
0
20
Order By: Relevance
“…Our work focuses on the four NSF-funded FIA architectures, with the aim of providing a more detailed investigation and comparison of a larger set of security features. Futhermore, different from [12], we analyze the security of NSF-funded FIA architecture resolution services.…”
Section: Introductionmentioning
confidence: 99%
“…Our work focuses on the four NSF-funded FIA architectures, with the aim of providing a more detailed investigation and comparison of a larger set of security features. Futhermore, different from [12], we analyze the security of NSF-funded FIA architecture resolution services.…”
Section: Introductionmentioning
confidence: 99%
“…Na subseção 2.1.2, já mencionamos alguns mecanismos que podem ser utilizados contra esse ataque. As contramedidas para restringir essa ameaça são bastante diversas, algumas envolvem teoria de sistemas distribuídos (tolerância a falhas), self-management (tolerância a falhas), outras alguns tipos de segurança operacional, como colocar equipamentos de Ąrewall, sistemas de detecção de invasão (IDSs) e sistema de prevenção de invasão (IPSs) (KUROSE; ROSS, 2013), ou até mesmo evitar através de um controle de Ćuxo ou mecanismo de alocação de banda (KHONDOKER et al, 2014).…”
Section: Disponibilidadeunclassified
“…A arquitetura TCP/IP mostrou-se incapaz de responder aos novos requisitos (QoS, QoE, mobilidade, multicasting, segurança, etc) demandados pelo surgimento de novas aplicações e serviços na rede mundial de computadores (PEREIRA, 2012) (SILVA, 2013) (KHONDOKER et al, 2014). Em parte, o efeito limitador dessa arquitetura concentrase basicamente em duas características: a sobrecarga que existe no endereçamento lógico IP (identiĄcador e localizador); e a estrutura rígida e inĆexível das camadas intermediárias (PEREIRA, 2012) (SILVA, 2013) (VENKATARAMANI et al, 2014).…”
Section: Limitações Da Arquitetura Tcp/ipunclassified
See 2 more Smart Citations