3,457 research outputs found

    Authorization Framework for the Internet-of-Things

    Get PDF
    This paper describes a framework that allows fine-grained and flexible access control to connected devices with very limited processing power and memory. We propose a set of security and performance requirements for this setting and derive an authorization framework distributing processing costs between constrained devices and less constrained back-end servers while keeping message exchanges with the constrained devices at a minimum. As a proof of concept we present performance results from a prototype implementing the device part of the framework

    The use of maxLength in the RPKI

    Full text link
    This document recommends that operators avoid using the maxLength attribute when issuing Route Origin Authorizations (ROAs) in the Resource Public Key Infrastructure (RPKI). These recommendations complement those in [RFC7115].https://datatracker.ietf.org/doc/draft-yossigi-rpkimaxlen/First author draf

    Design and evaluation of dynamic policy-based flow redirection for multihomed mobile netwotks

    Get PDF
    This paper presents the design, implementation and evaluation of a solution for dynamic redirection of traffic flows for multihomed mobile networks. The solution was developed for a mobile user that disposes of a Personal Area Network (PAN) with a Personal Mobile Router (PMR), in order to achieve Always Best Connected(ABC) service by distributing flows belonging to different applications among the most appropriate access networks. Designed in a modular way for a NEMO based mobility and multihoming support, the proposed flow redirection solution can be easily coupled with and controlled by dynamic traffic policies that come from advanced network intelligence, according to the currently available network resources and user and application requirements. A prototype implementation was validated and assessed on a testbed as proof-of-concept

    DCCP Simultaneous-Open Technique to Facilitate NAT/Middlebox Traversal

    Get PDF
    https://datatracker.ietf.org/doc/rfc5595/Publisher PD

    Reed-solomon forward error correction (FEC) schemes, RFC 5510

    Get PDF
    This document describes a Fully-Specified Forward Error Correction (FEC) Scheme for the Reed-Solomon FEC codes over GF(2^^m), where m is in {2..16}, and its application to the reliable delivery of data objects on the packet erasure channel (i.e., a communication path where packets are either received without any corruption or discarded during transmission). This document also describes a Fully-Specified FEC Scheme for the special case of Reed-Solomon codes over GF(2^^8) when there is no encoding symbol group. Finally, in the context of the Under-Specified Small Block Systematic FEC Scheme (FEC Encoding ID 129), this document assigns an FEC Instance ID to the special case of Reed-Solomon codes over GF(2^^8). Reed-Solomon codes belong to the class of Maximum Distance Separable (MDS) codes, i.e., they enable a receiver to recover the k source symbols from any set of k received symbols. The schemes described here are compatible with the implementation from Luigi Rizzo

    Resource design in constrained networks for network lifetime increase

    Get PDF
    As constrained "things" become increasingly integrated with the Internet and accessible for interactive communication, energy efficient ways to collect, aggregate, and share data over such constrained networks are needed. In this paper, we propose the use of constrained RESTful environments interfaces to build resource collections having a network lifetime increase in mind. More specifically, based on existing atomic resources, collections are created/designed to become available as new resources, which can be observed. Such resource design should not only match client's interests, but also increase network lifetime as much as possible. For this to happen, energy consumption should be balanced/fair among nodes so that node depletion is delayed. When compared with previous approaches, results show that energy efficiency and network lifetime can be increased while reducing control/registration messages, which are used to set up or change observations

    Governing by internet architecture

    Get PDF
    In the past thirty years, the exponential rise in the number of Internet users around the word and the intensive use of the digital networks have brought to light crucial political issues. Internet is now the object of regulations. Namely, it is a policy domain. Yet, its own architecture represents a new regulative structure, one deeply affecting politics and everyday life. This article considers some of the main transformations of the Internet induced by privatization and militarization processes, as well as their consequences on societies and human beings.En los últimos treinta años ha crecido de manera exponencial el número de usuarios de Internet alrededor del mundo y el uso intensivo de conexiones digitales ha traído a la luz cuestiones políticas cruciales. Internet es ahora objeto de regulaciones. Es decir, es un ámbito de la política. Aún su propia arquitectura representa una nueva estructura reguladora, que afecta profundamente la política y la vida cotidiana. Este artículo considera algunas de las principales transformaciones de Internet inducida por procesos de privatización y militarización, como también sus consecuencias en las sociedades y en los seres humanos

    Design and Experimental Evaluation of a Route Optimisation Solution for NEMO

    Get PDF
    An important requirement for Internet protocol (IP) networks to achieve the aim of ubiquitous connectivity is network mobility (NEMO). With NEMO support we can provide Internet access from mobile platforms, such as public transportation vehicles, to normal nodes that do not need to implement any special mobility protocol. The NEMO basic support protocol has been proposed in the IETF as a first solution to this problem, but this solution has severe performance limitations. This paper presents MIRON: Mobile IPv6 route optimization for NEMO, an approach to the problem of NEMO support that overcomes the limitations of the basic solution by combining two different modes of operation: a Proxy-MR and an address delegation with built-in routing mechanisms. This paper describes the design and rationale of the solution, with an experimental validation and performance evaluation based on an implementation.Publicad
    • …
    corecore