Telecommunications Science ›› 2019, Vol. 35 ›› Issue (9): 20-28.doi: 10.11959/j.issn.1000-0801.2019215

• Topic:data network protocol architecture innovation——NewIP • Previous Articles     Next Articles

Network architecture with intrinsic security

Weiyu JIANG,Bingyang LIU,Chuang WANG   

  1. Huawei Technologies Co.,Ltd.,Beijing 100095,China
  • Revised:2019-09-10 Online:2019-09-20 Published:2019-09-30
  • Supported by:
    The National Key Research and Development Program of China(2018YFB180079)

Abstract:

IP network brings big benefits for human’s life by connecting most devices all over the world,but its security and privacy issues make people frustrating when using end to end communication.Without intrinsic security design of the network,it is difficult for patch-like solutions to cure stubborn security issues (IP spoofing,privacy leakage,MITM attack,DDoS,etc.).On the basis of surveying different kinds of security threats and related security techniques,an overview of the security weakness analysis was given,and network architecture with intrinsic security (NAIS) was presented,including dynamic ID/IP with intrinsic security,security verification and audit protocols,and cross-domain cooperation defense mechanism,which could provide security and trustworthiness for end to end communication.

Key words: IP network, intrinsic security, privacy, accountability, DDoS

CLC Number: 

[1] Huiling Zhao,Zhifeng Jiang. Ubiquitous Network and Service[J]. Telecommunications Science, 2009, 25(12): 1 -3 .
[2] . [J]. Journal on Communications, 2010, 0(9): 12 -73 .
[3] . [J]. Journal on Communications, 2006, 27(7): 22 -140 .
[4] . [J]. Journal on Communications, 2007, 28(5): 16 -108 .
[5] . [J]. Journal on Communications, 2007, 28(6): 1 -6 .
[6] . [J]. Journal on Communications, 2008, 29(11A): 14 -76 .
[7] . [J]. Journal on Communications, 2008, 29(11A): 18 -95 .
[8] . [J]. Journal on Communications, 2006, 27(8): 29 -164 .
[9] . Research at flat underlying network architecture of campus[J]. Journal on Communications, 2014, 35(Z1): 21 -112 .
[10] Zhe Du,Chengbin Shen,Ming Jiang,Jidong Wang. Operation Administration and Maintenance of Optical Access Network Based on PON Technology[J]. Telecommunications Science, 2010, 26(8): 24 -29 .