Implications of Security Enhancements and Interventions for Core Internet Infrastructure

نویسندگان

  • Sharon Goldberg
  • Stephanie Forrest
چکیده

Security enhancements to the Internet are often implemented as hierarchical and centralizing structures grafted onto what is fundamentally a decentralized design. Hierarchical structures, such as DNSSEC and RPKI, provide a convenient way to enforce consistency and prevent important categories of security violations. They also provide a locus of control for trusted authorities who have access to the higher levels of the hierarchy. These control points can be used to enforce many kinds of policy interventions, including local laws and censorship. This paper considers three security enhancements, DNSSEC, SSL PKI, and RPKI, which provide secure translation infrastructures through a hierarchical authentication system. It reviews the design of each system, describes the security vulnerabilities that they protect against and how attackers have responded, explains how centralized authorities have used them to exercise unilateral control, and discusses the tradeoffs and risks associated with these interventions. The paper then considers the policy implications of these interventions and proposes some guiding principles to mitigate negative consequences.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bootstrapping the Adoption of Internet Security Protocols

The deployment of network-wide security enhancements to the Internet has proven more difficult than many had initially anticipated. We leverage existing models of networks’ value to model the problem of bootstrapping the adoption of security technologies. We describe a variety of policy interventions and deployment strategies that can help to catalyze this adoption. Using this framework, we pro...

متن کامل

Computer security in the future

Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...

متن کامل

On Demand Network-wide VPN Deployment in GPRS

The Mobile Internet requires enhanced security services available to all mobile subscribers in a dynamic fashion. A network-wide Virtual Private Network (VPN) deployment scenario over the General Packet Radio Service (GPRS) is proposed and analyzed from a security viewpoint. The proposed security scheme improves the level of protection that is currently supported in GPRS and facilitates the rea...

متن کامل

The Internet public key infrastructure

Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. Modern secret key cryptography brought much greater security, but eventually proved vulnerable to brute-force attacks. Public key cryptography has now emerged as the core technology for modern comp...

متن کامل

Feasibility of Implementing Blockchain and Internet of Things Technologies in Hospitals Affiliated to Tabriz University of Medical Sciences

Objective Considering the importance of implementing Internet of Thing (IoT) and blockchain technologies in the health sector, and the need to assess the feasibility of each project before implementation, this study aims to assess feasibility of implementing blockchain and IoT technologies in hospitals affiliated to Tabriz University of Medical Sciences. Methods This cross-sectional study was ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014