Security at the Internet Layer
نویسنده
چکیده
43 I nternet Protocol, version 6, was conceived with two main goals: increase address space and improve security, relative to IPv4. 1 The community achieved the first goal by increasing the IP address length from 32 bits to 128 bits. To meet the second goal, the Internet Engineering Task Force chartered the IP Security Working Group to design a security architecture and corresponding protocols that would provide cryptographically based security for IPv6 As work progressed, however, the IP community realized that the security architecture proposed for IPv6 could also be used for IPv4. Consequently, they extended this charter to retrofitting the security protocols , or IPsec protocols, into IPv4 implementations. 2 Many IPv4 software vendors have announced they will support the IPsec protocols in future releases. This retrofitting is an important part of the working group's charter because IPv6 deployment is turning out to be slow. As the sidebar " Should Security Be at the Internet Layer? " describes, some vendors are using other security technologies and protocols to retrofit security at some higher layer in the TCP/IP protocol stack. In this article, I overview the proposed security architecture and the two main protocols—the IP Security Protocol and the Internet Key Management Protocol—describe the risks they address, and touch on some implementation requirements. IPsec's major advantage is that it can provide security services transparently to both applications and users. Also, the application programs using IPsec need not be modified in any way. This is particularly important when securing application programs that are not available in source code, which is common today. This transparency sets IPsec apart from security protocols that operate above the Internet layer. At present, IPsec is likely to be used in conjunction with and complemented by other security technologies, mechanisms, and protocols. Examples include firewalls and strong authentication mechanisms for access control , and higher layer security protocols for end-to-end communication security. 3,4 In the near future, however, as virtual private networking and corporate intranets and extranets mature, IPsec is likely to be deployed on a larger scale. During the past decade, reports of network-based attacks and exploitations of bugs and design limitations have grown dramatically. 5 More recently, the use and proliferation of downloadable, executable content, such as that provided by Java applets and ActiveX controls, have opened new possibilities to attack networked computer systems and Internet sites. A 1996 survey (http:// www.trouble.org/survey) of approximately 2,200 …
منابع مشابه
Distance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملA Security Architecture for the Internet Protocol
In this paper we present the design, rationale, and implementation of a security architecture for protecting the secrecy and integrity of Internet traffic at the Internet Protocol (IP) layer. The design includes three components: (1) a security policy for determining when, where, and how security measures are to be applied; (2) a modular key management protocol, called MKMP, for establishing sh...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملSecuring Wireless Communications of the Internet of Things from the Physical Layer, An Overview
The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of...
متن کاملTransport Layer Security Working Group Tim Dierks INTERNET - DRAFT Consensus Development
This document specifies Version 1.0 of the Transport Layer Security (TLS) protocol, which is at this stage is strictly based on the Secure Sockets Layer (SSL) version 3.0 protocol, and is to serve as a basis for future discussions. The TLS protocol provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to preven...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Computer
دوره 31 شماره
صفحات -
تاریخ انتشار 1998