Securing Delay-Tolerant Networks with BPSec
eBook - PDF

Securing Delay-Tolerant Networks with BPSec

  1. English
  2. PDF
  3. Available on iOS & Android
eBook - PDF

Securing Delay-Tolerant Networks with BPSec

Book details
Table of contents
Citations

About This Book

Securing Delay-Tolerant Networks with BPSec

One-stop reference on how to secure a Delay-Tolerant Network (DTN), written by experienced industry insiders

Securing Delay-Tolerant Networks with BPSec answers the question, "How can delay-tolerant networks be secured when operating in environments that would otherwise break many of the common security approaches used on the terrestrial Internet today?"

The text is composed of three sections: (1) security considerations for delay-tolerant networks, (2) the design, implementation, and customization of the BPSec protocol, and (3) how this protocol can be applied, combined with other security protocols, and deployed in emerging network environments.

The text includes pragmatic considerations for deploying BPSec in both regular and delay-tolerant networks. It also features a tutorial on how to achieve several important security outcomes with a combination of security protocols, BPSec included.

Overall, it covers best practices for common security functions, clearly showing designers how to prevent network architecture from being over-constrained by traditional security approaches.

Written by the lead author and originator of the BPSec protocol specification, Securing Delay-Tolerant Networks (DTNs) with BPSec includes information on:

  • The gap between cryptography and network security, how security requirements constrain network architectures, and why we need something different
  • DTN stressing conditions, covering intermittent connectivity, congested paths, partitioned topologies, limited link state, and multiple administrative controls
  • Securing the terrestrial internet, involving a layered approach to security, the impact of protocol design on security services, and securing the internetworking and transport layers
  • A delay-tolerant security architecture, including desirable properties of a DTN secure protocol, fine-grained security services, and protocol augmentation

Securing Delay-Tolerant Networks (DTNs) with BPSec is a one-stop reference on the subject for any professional operationally deploying BP who must use BPSec for its security, including software technical leads, software developers, space flight mission leaders, network operators, and technology and product development leaders in general.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Securing Delay-Tolerant Networks with BPSec by Edward J. Birrane, III,Sarah Heiner,Ken McKeever in PDF and/or ePUB format, as well as other popular books in Technology & Engineering & Electrical Engineering & Telecommunications. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Contents
  5. Acronyms
  6. About the Authors
  7. Foreword
  8. Preface
  9. About the Companion Website
  10. Chapter 1 Introduction
  11. Chapter 2 Network Design Considerations
  12. Chapter 3 DTN Security Stressors and Strategies
  13. Chapter 4 Delay‐Tolerant Security Architecture Elements
  14. Chapter 5 The Design of the Bundle Protocol Security Extensions
  15. Chapter 6 The BPSec Security Mechanism
  16. Chapter 7 Security Block Processing
  17. Chapter 8 Security Dependency Management
  18. Chapter 9 Threat Considerations for BPv7 Networks
  19. Chapter 10 Using Security Contexts
  20. Chapter 11 Security Context Design
  21. Chapter 12 Security Policy Overview
  22. Chapter 13 Achieving Security Outcomes
  23. Chapter 14 Special Considerations
  24. Appendix A Example Security Contexts
  25. Appendix B Security Block Processing
  26. Appendix C Bundle Protocol Data Representation
  27. Index
  28. EULA