Securing Delay-Tolerant Networks with BPSec answers the question Ahow can delay-tolerant networks be secured when operating in environments that would otherwise break many of the common security approaches used on the terrestrial Internet today.A This book is decomposed into three sections: (1) security considerations for delay-tolerant networks, (2) the design, implementation, and customization of the BPSec protocol, and (3) how this protocol can be applied, combined with other security protocols, and deployed in an example case study
The first section presents the challenges of securing disrupted networks. The section starts with a distinction between cryptography as a discipline and the security protocols used to exchange cryptographic materials. This is followed by a discussion of the unique stressors found in DTNs and how these stressing conditions break many of the protocols used to secure the terrestrial Internet. Finally, this section discusses the characteristics of a security architecture for DTNs and the unique security considerations.
The second section focuses on the history and development of the BPSec protocol itself. Next, the mechanisms used to represent cryptographic materials in bundles are discussed along with rules used for the processing of BPSec materials. This section concludes with a discussion of two characteristics of the BPSec protocol: security context definitions and out-of-band policy configurations.
The third section discusses pragmatic considerations for deploying BPSec in both regular and delay-tolerant networks. This section discusses how BPSec interacts with both DTN and non-DTN protocols and how the protocol can be extended to encounter a variety of methods for defining and communicating cryptographic material. This is followed by a series of use cases illustrating the function of BPSec in a network and a tutorial on how to achieve important security outcomes with a combination of security protocols, BPSec included. The section concludes with both a discussion of security concerns and a case study for securing cislunar communications.
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Maße
Höhe: 260 mm
Breite: 183 mm
Dicke: 24 mm
Gewicht
ISBN-13
978-1-119-82347-6 (9781119823476)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Edward Birrane is CTO at Tolerant Network Solutions, LLC, Adjunct Faculty at University of Maryland, Baltimore County, and supervises the embedded applications group of the Johns Hopkins University Applied Physics Laboratory Space Exploration Sector. He received his Ph.D. from the University of Maryland, Baltimore County. He is the author of multiple specifications related to the transport, security, and management of DTNs and is the lead author and originator of the BPSec protocol specification.
Sarah Heiner is an Embedded Software Engineer within Johns Hopkins University APL.
Ken McKeever is an Engineer within Johns Hopkins University Applied Physics Laboratory.