Security and privacy issues for the network of the future

被引:9
作者
Marias, Giannis F. [1 ]
Barros, Joao [2 ]
Fiedler, Markus [3 ]
Fischer, Andreas [4 ]
Hauff, Harald [4 ]
Herkenhoener, Ralph [4 ]
Grillo, Antonio [5 ]
Lentini, Alessandro [5 ]
Lima, Luisa [6 ]
Lorentzen, Charlott [3 ]
Mazurczyk, Wojciech [7 ]
de Meer, Hermann [4 ]
Oliveira, Paulo F. [6 ]
Polyzos, George C. [1 ]
Pujol, Enric [8 ]
Szczypiorski, Krzysztof [7 ]
Vilela, Joao P. [6 ]
Vinhoza, Tiago T. V. [2 ]
机构
[1] Athens Univ Econ & Business, Dept Informat, Mobile Multimedia Lab, Athens, Greece
[2] Univ Porto, Fac Engn, Inst Telecomunicacoes, P-4100 Oporto, Portugal
[3] Blekinge Inst Technol, Karlskrona, Sweden
[4] Univ Passau, Passau, Germany
[5] Univ Roma Tor Vergata, Dept Comp Sci Syst & Mfg, Rome, Italy
[6] Univ Porto, Fac Ciencias, Inst Telecomunicacoes, P-4100 Oporto, Portugal
[7] Warsaw Univ Technol, Inst Telecommun, Fac Elect & Informat Technol, Warsaw, Poland
[8] Fraunhofer Inst Open Commun Syst, Berlin, Germany
关键词
security; privacy; networks; COGNITIVE RADIO; CODING APPROACH; STEGANOGRAPHY;
D O I
10.1002/sec.384
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The vision towards the Network of the Future cannot be separated from the fact that today's networks, and networking services are subject to sophisticated and very effective attacks. When these attacks first appeared, spoofing and distributed denial-of-service attacks were treated as apocalypse for networking. Now, they are considered moderate damage, whereas more sophisticated and inconspicuous attacks, such as botnets activities, might have greater and far reaching impact. As the Internet is expanding to mobile phones and smart dust and as its social coverage is liberalized towards the realization of ubiquitous computing (with communication), the concerns on security and privacy have become deeper and the problems more challenging than ever. Re-designing the Internet as the Network of the Future is self-motivating for researchers, and security and privacy cannot be provided again as separate, external, add-on, solutions. In this paper, we discuss the security and privacy challenges of the Network of the Future and try to delimit the solutions space on the basis of emerging techniques. We also review methods that help the quantification of security and privacy in an effort to provide a more systematic and quantitative treatment of the area in the future. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:987 / 1005
页数:19
相关论文
共 123 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]  
Andersson Loa, 2007, IAB WORKSH UNW TRAFF
[3]  
[Anonymous], P 11 IEEE INT C COMM
[4]  
[Anonymous], 50159 DIN EN 1
[5]  
[Anonymous], P 21 INT C ADV NETW
[6]  
[Anonymous], P 12 IEEE INT S IND
[7]  
[Anonymous], P INT C INF TECHN CO
[8]  
[Anonymous], P 9 USENIX SEC S
[9]  
[Anonymous], P 13 INT C INT NEXT
[10]  
[Anonymous], THESIS HELSINKI U TE