Securing Delay-Tolerant Networks with BPSec

Birrane,Sarah Heiner,Ken McKeever

Securing Delay-Tolerant Networks with BPSec
Format
Hardback
Publisher
John Wiley and Sons Ltd
Country
United States
Published
20 February 2023
Pages
352
ISBN
9781119823476

Securing Delay-Tolerant Networks with BPSec

Birrane,Sarah Heiner,Ken McKeever

Securing Delay-Tolerant Networks with BPSec answers the question Ahow can delay-tolerant networks be secured when operating in environments that would otherwise break many of the common security approaches used on the terrestrial Internet today.A This book is decomposed into three sections: (1) security considerations for delay-tolerant networks, (2) the design, implementation, and customization of the BPSec protocol, and (3) how this protocol can be applied, combined with other security protocols, and deployed in an example case study

The first section presents the challenges of securing disrupted networks. The section starts with a distinction between cryptography as a discipline and the security protocols used to exchange cryptographic materials. This is followed by a discussion of the unique stressors found in DTNs and how these stressing conditions break many of the protocols used to secure the terrestrial Internet. Finally, this section discusses the characteristics of a security architecture for DTNs and the unique security considerations.

The second section focuses on the history and development of the BPSec protocol itself. Next, the mechanisms used to represent cryptographic materials in bundles are discussed along with rules used for the processing of BPSec materials. This section concludes with a discussion of two characteristics of the BPSec protocol: security context definitions and out-of-band policy configurations.

The third section discusses pragmatic considerations for deploying BPSec in both regular and delay-tolerant networks. This section discusses how BPSec interacts with both DTN and non-DTN protocols and how the protocol can be extended to encounter a variety of methods for defining and communicating cryptographic material. This is followed by a series of use cases illustrating the function of BPSec in a network and a tutorial on how to achieve important security outcomes with a combination of security protocols, BPSec included. The section concludes with both a discussion of security concerns and a case study for securing cislunar communications.

This item is not currently in-stock. It can be ordered online and is expected to ship in 10-14 days

Our stock data is updated periodically, and availability may change throughout the day for in-demand items. Please call the relevant shop for the most current stock information. Prices are subject to change without notice.

Sign in or become a Readings Member to add this title to a wishlist.