Securing Delay-Tolerant Networks With Bpsec

使用 BPSec 保护延迟容忍网络

计算机应用

原   价:
1667.5
售   价:
1334.00
优惠
平台大促 低至8折优惠
发货周期:国外库房发货,通常付款后3-5周到货!
作      者
出  版 社
出版时间
2022年12月16日
装      帧
精装
ISBN
9781119823476
复制
页      码
352
开      本
17.78 x 25.40 cm.
语      种
英文
综合评分
暂无评分
我 要 买
- +
库存 30 本
  • 图书详情
  • 目次
  • 买家须知
  • 书评(0)
  • 权威书评(0)
图书简介
Securing Delay-Tolerant Networks with BPSec answers the question ?how can delay-tolerant networks be secured when operating in environments that would otherwise break many of the common security approaches used on the terrestrial Internet today.? This book is decomposed into three sections: (1) security considerations for delay-tolerant networks, (2) the design, implementation, and customization of the BPSec protocol, and (3) how this protocol can be applied, combined with other security protocols, and deployed in an example case study The first section presents the challenges of securing disrupted networks. The section starts with a distinction between cryptography as a discipline and the security protocols used to exchange cryptographic materials. This is followed by a discussion of the unique stressors found in DTNs and how these stressing conditions break many of the protocols used to secure the terrestrial Internet. Finally, this section discusses the characteristics of a security architecture for DTNs and the unique security considerations. The second section focuses on the history and development of the BPSec protocol itself. Next, the mechanisms used to represent cryptographic materials in bundles are discussed along with rules used for the processing of BPSec materials. This section concludes with a discussion of two characteristics of the BPSec protocol: security context definitions and out-of-band policy configurations. The third section discusses pragmatic considerations for deploying BPSec in both regular and delay-tolerant networks. This section discusses how BPSec interacts with both DTN and non-DTN protocols and how the protocol can be extended to encounter a variety of methods for defining and communicating cryptographic material. This is followed by a series of use cases illustrating the function of BPSec in a network and a tutorial on how to achieve important security outcomes with a combination of security protocols, BPSec included. The section concludes with both a discussion of security concerns and a case study for securing cislunar communications.
本书暂无推荐
本书暂无推荐
看了又看
  • 上一个
  • 下一个