Security at the Internet Layer

نویسنده

  • Rolf Oppliger
چکیده

43 I nternet Protocol, version 6, was conceived with two main goals: increase address space and improve security, relative to IPv4. 1 The community achieved the first goal by increasing the IP address length from 32 bits to 128 bits. To meet the second goal, the Internet Engineering Task Force chartered the IP Security Working Group to design a security architecture and corresponding protocols that would provide cryptographically based security for IPv6 As work progressed, however, the IP community realized that the security architecture proposed for IPv6 could also be used for IPv4. Consequently, they extended this charter to retrofitting the security protocols , or IPsec protocols, into IPv4 implementations. 2 Many IPv4 software vendors have announced they will support the IPsec protocols in future releases. This retrofitting is an important part of the working group's charter because IPv6 deployment is turning out to be slow. As the sidebar " Should Security Be at the Internet Layer? " describes, some vendors are using other security technologies and protocols to retrofit security at some higher layer in the TCP/IP protocol stack. In this article, I overview the proposed security architecture and the two main protocols—the IP Security Protocol and the Internet Key Management Protocol—describe the risks they address, and touch on some implementation requirements. IPsec's major advantage is that it can provide security services transparently to both applications and users. Also, the application programs using IPsec need not be modified in any way. This is particularly important when securing application programs that are not available in source code, which is common today. This transparency sets IPsec apart from security protocols that operate above the Internet layer. At present, IPsec is likely to be used in conjunction with and complemented by other security technologies, mechanisms, and protocols. Examples include firewalls and strong authentication mechanisms for access control , and higher layer security protocols for end-to-end communication security. 3,4 In the near future, however, as virtual private networking and corporate intranets and extranets mature, IPsec is likely to be deployed on a larger scale. During the past decade, reports of network-based attacks and exploitations of bugs and design limitations have grown dramatically. 5 More recently, the use and proliferation of downloadable, executable content, such as that provided by Java applets and ActiveX controls, have opened new possibilities to attack networked computer systems and Internet sites. A 1996 survey (http:// www.trouble.org/survey) of approximately 2,200 …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distance-Aware Beamforming for Multiuser Secure Communication Systems

Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems)  are possible alternatives to provide security for such applications. In this paper, we consid...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

A Security Architecture for the Internet Protocol

In this paper we present the design, rationale, and implementation of a security architecture for protecting the secrecy and integrity of Internet traffic at the Internet Protocol (IP) layer. The design includes three components: (1) a security policy for determining when, where, and how security measures are to be applied; (2) a modular key management protocol, called MKMP, for establishing sh...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of...

متن کامل

Transport Layer Security Working Group Tim Dierks INTERNET - DRAFT Consensus Development

This document specifies Version 1.0 of the Transport Layer Security (TLS) protocol, which is at this stage is strictly based on the Secure Sockets Layer (SSL) version 3.0 protocol, and is to serve as a basis for future discussions. The TLS protocol provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to preven...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Computer

دوره 31  شماره 

صفحات  -

تاریخ انتشار 1998