Protecting digital identities in future networks
P Martinez-Julia, AF Gomez-Skarmeta… - 2011 future network …, 2011 - ieeexplore.ieee.org
2011 future network & mobile summit, 2011•ieeexplore.ieee.org
The basic idea behind the locator/identifier separation in network protocols is to differentiate
the location (where) from the entity (who) that is taking part in the communication. But the
architectures following this idea are finally associating an entity with the particular device it is
using to communicate, which means that actual identity behind the device is not considered
enough and that its identifier is somehow disclosed. This behavior manifests different
problems, like the traceability and overall privacy, and misses the opportunity to involve the …
the location (where) from the entity (who) that is taking part in the communication. But the
architectures following this idea are finally associating an entity with the particular device it is
using to communicate, which means that actual identity behind the device is not considered
enough and that its identifier is somehow disclosed. This behavior manifests different
problems, like the traceability and overall privacy, and misses the opportunity to involve the …
The basic idea behind the locator/identifier separation in network protocols is to differentiate the location (where) from the entity (who) that is taking part in the communication. But the architectures following this idea are finally associating an entity with the particular device it is using to communicate, which means that actual identity behind the device is not considered enough and that its identifier is somehow disclosed. This behavior manifests different problems, like the traceability and overall privacy, and misses the opportunity to involve the actual identity of the different parties in the communication operation. In this paper we propose an architecture to enhance Future Internet by creating a secure and scalable communication infrastructure to build an identity plane that enhances privacy preventing identity traceability while involving identities in the network operation.
ieeexplore.ieee.org
Showing the best result for this search. See all results