Skip to Main Content
Securing Delay-Tolerant Networks with BPSec
book

Securing Delay-Tolerant Networks with BPSec

by Edward J. Birrane, III, Sarah Heiner, Ken McKeever
January 2023
Intermediate to advanced content levelIntermediate to advanced
352 pages
12h 37m
English
Wiley
Content preview from Securing Delay-Tolerant Networks with BPSec

Appendix BSecurity Block Processing

B.1 Overview

This appendix details some of the processing steps taken by Bundle Protocol Agents (BPAs) as they generate and receive security blocks. Understanding these steps is beneficial for BPA software developers, security context designers, and those building configurations and policies as part of operating Bundle Protocol version 7 (BPv7) networks.

This appendix is segmented into three subsections, defined as follows.

  1. Processing single-target, single-result security contexts.
  2. Processing single-target, multiple-result security contexts.
  3. Processing multiple security sources (with multiple security contexts).

These subsections each provide reference scenarios relating to the use of the bcb-confidentiality security service, bib-integrity security service, or both. They also enumerate processing steps associated with actions taken at security sources, security verifiers, and security acceptors as required by Bundle Protocol Security (BPSec). Finally, common error conditions that may arise during those steps are listed and these error conditions are mapped to recommended responses.

B.2 Single-Target Single-Result Security Contexts

Single-Target, Single-Result (STSR) security contexts represent a 1-1 mapping of target blocks and cipher suite invocations. This does not mean that such a security context only produces a single cipher suite output value, it simply means that the security service is applied exactly once per target block. A ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize Availability and Performance

Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize Availability and Performance

Andy Sholomon, Tom Kunath
Linux® Kernel Primer, The: A Top-Down Approach for x86 and PowerPC Architectures

Linux® Kernel Primer, The: A Top-Down Approach for x86 and PowerPC Architectures

Claudia Salzberg Rodriguez, Gordon Fischer, Steven Smolski
Switching to VoIP

Switching to VoIP

Theodore Wallingford

Publisher Resources

ISBN: 9781119823476Purchase Link