The TCP/IP architecture was originally designed without taking security measures into consideration. Over the years, it has been subjected to many attacks, which has led to many patches to counter them. Our investigations into the fundamental principles of networking have shown that carefully following an abstract model of Interprocess Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate Recursive INternet Architecture (RINA) [2]. In this paper, we show how, without the aid of cryptographic techniques, the bare-bones architecture of RINA can resist most of the security attacks faced by TCP/IP. We also show how hard it is for an intruder to compromise RINA. Then, we show how RINA inherently...
This is the report on a workshop held at CMU on July 12-14, 2005. The workshop is part of the planni...
During the last decades, Internet has evolved from host-centric toinformation-centric in the sense t...
Numerous cyberattack incidents have demonstrated adversaries’ capability to cause Internet outages l...
Abstract—The TCP/IP architecture was originally designed without taking security measures into consi...
Current Internet security is complex, expensive and ineffective. The usual argument is that the TCP/...
turn to Fundamentals, a new approach to designing and building networks based on the fundamental con...
Recursive Inter-Network Architecture (RINA) networks have a shorter protocol stack than the current...
Driven by the requirements of the emerging applications and networks, the Internet has become an arc...
—Communication technology improvements have inspired the idea of connecting almost every things to t...
Today’s Internet is facing significant challenges as the number of the connected devices, applicatio...
The Internet has become a global computing phenomenon, and during the 1990's has had more influence ...
The Internet faces many challenges in terms of flexibility (so called IP bottleneck) as well as host...
M.Sc.Using the Internet for communication purposes constitutes a high risk, considering the security...
The TCP/IP protocol suite, which is very widely used today, was developed under the sponsorship of t...
The Recursive InterNetwork Architecture (RINA) is a recently proposed network architecture based on ...
This is the report on a workshop held at CMU on July 12-14, 2005. The workshop is part of the planni...
During the last decades, Internet has evolved from host-centric toinformation-centric in the sense t...
Numerous cyberattack incidents have demonstrated adversaries’ capability to cause Internet outages l...
Abstract—The TCP/IP architecture was originally designed without taking security measures into consi...
Current Internet security is complex, expensive and ineffective. The usual argument is that the TCP/...
turn to Fundamentals, a new approach to designing and building networks based on the fundamental con...
Recursive Inter-Network Architecture (RINA) networks have a shorter protocol stack than the current...
Driven by the requirements of the emerging applications and networks, the Internet has become an arc...
—Communication technology improvements have inspired the idea of connecting almost every things to t...
Today’s Internet is facing significant challenges as the number of the connected devices, applicatio...
The Internet has become a global computing phenomenon, and during the 1990's has had more influence ...
The Internet faces many challenges in terms of flexibility (so called IP bottleneck) as well as host...
M.Sc.Using the Internet for communication purposes constitutes a high risk, considering the security...
The TCP/IP protocol suite, which is very widely used today, was developed under the sponsorship of t...
The Recursive InterNetwork Architecture (RINA) is a recently proposed network architecture based on ...
This is the report on a workshop held at CMU on July 12-14, 2005. The workshop is part of the planni...
During the last decades, Internet has evolved from host-centric toinformation-centric in the sense t...
Numerous cyberattack incidents have demonstrated adversaries’ capability to cause Internet outages l...