Skip to Main Content
Securing Delay-Tolerant Networks with BPSec
book

Securing Delay-Tolerant Networks with BPSec

by Edward J. Birrane, III, Sarah Heiner, Ken McKeever
January 2023
Intermediate to advanced content levelIntermediate to advanced
352 pages
12h 37m
English
Wiley
Content preview from Securing Delay-Tolerant Networks with BPSec

12Security Policy Overview

The potentially challenged nature of BPv7 networks places unique constraints on the establishment and upkeep of security configuration and policy information. Importantly, policy expressions cannot always be negotiated in real-time between secure endpoints, as there might not exist connectivity between those endpoints.

BPSec, in particular, requires an expressive security policy to handle the processing of security operations in a bundle. This policy being made more complex by the fact that security operations can be applied block-by-block and not bundle-by-bundle, that these operations can use different security contexts, and that Bundle Protocol Agents (BPAs) have multiple roles of sources, verifiers, and acceptors.

This chapter outlines a policy model that can be used as a basis for developing security policy expressions and software implementations for BPv7 networks. This includes a discussion of the ways in which policy can be communicated in a network and common events and actions that should be considered.

After reading this chapter you will be able to:

12.1 Overview

The diversity of BPv7 network constraints, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize Availability and Performance

Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize Availability and Performance

Andy Sholomon, Tom Kunath
Linux® Kernel Primer, The: A Top-Down Approach for x86 and PowerPC Architectures

Linux® Kernel Primer, The: A Top-Down Approach for x86 and PowerPC Architectures

Claudia Salzberg Rodriguez, Gordon Fischer, Steven Smolski
Switching to VoIP

Switching to VoIP

Theodore Wallingford

Publisher Resources

ISBN: 9781119823476Purchase Link