Skip to Main Content
Securing Delay-Tolerant Networks with BPSec
book

Securing Delay-Tolerant Networks with BPSec

by Edward J. Birrane, III, Sarah Heiner, Ken McKeever
January 2023
Intermediate to advanced content levelIntermediate to advanced
352 pages
12h 37m
English
Wiley
Content preview from Securing Delay-Tolerant Networks with BPSec

14Special Considerations

Securing any network is a complex combination of protocols, configurations, policies, and proper software and hardware implementations. High-availability and low-latency networks beneficially leverage their communications infrastructure to support helpful security functions such as just-in-time key negotiation. Networks, particularly those conforming to the Delay Tolerant Networking (DTN) architecture, cannot rely on a communications infrastructure with such assumptions. Instead, these networks must rely on out-of-band mechanisms in cases where end-to-end negotiation is not possible.

Therefore, a Bundle Protocol version 7 (BPv7) network is at best as difficult to secure as any other terrestrial network and at worst much harder. This chapter discusses some of the unique challenges that must be addressed when securing any type of BPv7 network and those special considerations when securing networks conforming to the DTN architecture.

After reading this chapter you will be able to:

14.1 Scoping Security Concerns

The security of message data in a network must include mechanisms for data confidentiality, integrity, and authentication. BPSec defines the bcb-confidentiality service to apply data confidentiality ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize Availability and Performance

Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize Availability and Performance

Andy Sholomon, Tom Kunath
Linux® Kernel Primer, The: A Top-Down Approach for x86 and PowerPC Architectures

Linux® Kernel Primer, The: A Top-Down Approach for x86 and PowerPC Architectures

Claudia Salzberg Rodriguez, Gordon Fischer, Steven Smolski
Switching to VoIP

Switching to VoIP

Theodore Wallingford

Publisher Resources

ISBN: 9781119823476Purchase Link