Proceedings of the ACM SIGCOMM 2010 Conference 2010
DOI: 10.1145/1851182.1851200
|View full text |Cite
|
Sign up to set email alerts
|

Encrypting the internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 31 publications
(13 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…Besides, Lagesse et al [2009] argue that there is still no generic framework for deploying and extending traditional security mechanisms over a variety of pervasive systems. Regarding security concerns of the network layer, Kounavis et al [2010] suggest that the Internet can be gradually encrypted and authenticated based on the observations that the recent advances in implementation of cryptographic algorithms have made general purpose processors capable of encrypting packets at high rates. But how to generalize such algorithms to IoT would be challenging as things in IoT normally only maintain low transmission rates and connections are usually intermittent.…”
Section: Open Issuesmentioning
confidence: 99%
“…Besides, Lagesse et al [2009] argue that there is still no generic framework for deploying and extending traditional security mechanisms over a variety of pervasive systems. Regarding security concerns of the network layer, Kounavis et al [2010] suggest that the Internet can be gradually encrypted and authenticated based on the observations that the recent advances in implementation of cryptographic algorithms have made general purpose processors capable of encrypting packets at high rates. But how to generalize such algorithms to IoT would be challenging as things in IoT normally only maintain low transmission rates and connections are usually intermittent.…”
Section: Open Issuesmentioning
confidence: 99%
“…This solution might technically provide the highest security, but is considered to be inefficient because the usage of HTTPS tends to decrease data communication rate, with an overall decreasing of the usability of the migration environment. A more recent investigation, discussed in [7], has proposed techniques for speeding up cryptographic algorithms. However, this solution is still at a preliminary stage for general adoption.…”
Section: Proxy Navigation and Securitymentioning
confidence: 99%
“…As a result, the cryptographic algorithms that support such secure communications become a critical computational load for servers, and therefore an important target for optimization (see [ 6]). The performance of RSA is an important case, because RSA is part of the handshake of practically all TSL/SSL sessions.…”
Section: Introductionmentioning
confidence: 99%