Page 113 - Kaleidoscope Academic Conference Proceedings 2021
P. 113

Connecting physical and virtual worlds




           information about how individual packets should be treated   constraint-based routing can utilize the flexible addressing in
           to meet user and application requirements.         providing scoped semantic  actions  on flexible addresses,
                                                              those actions enriched by constraints that may be defined by
           Semantic addressing caters to an increasing  number  of   service and  network  providers alike. Semantic routing
           services that utilize the data plane of the network, with the   capabilities can enable the provisioning of services without
           goal to bring the routing to key services “closer” to the basic   explicit mapping services albeit possibly existing alongside
           data plane operations.  The driver behind supporting  such   current name resolution systems, such as the DNS. Latency
           varying semantics is that digital communication networks   reductions of such routing solutions are expected, e.g., by not
           are  not limited to those operating based on locator-based   relying on said explicit mapping services, as well as being
           addressing and routing solutions of the Internet, but instead   able to accommodate routing changes due to fast changing
           use sector-specific packet forwarding solutions that may use   availability of compute and storage resources throughout the
           service  or content identifiers, sensor/host identifiers,  path   network.
           identifiers or others, towards the Internet integration of those
           vertical networks that are currently not integrated.    3.3   Intrinsic security and privacy

           Different techniques have  been proposed to modify the   Additional security mechanisms are needed beyond those
           default IP forwarding behaviors (such as least-cost path) and   that are provided by traditional transport mode IP security.
           extend the semantics of IP addresses by assigning additional
           meanings to some parts of the address, or by partitioning the   Intrinsic security and privacy capabilities address inherent
           address into a set of   subfields that give scoped addressing   security, privacy and trustworthiness vulnerabilities of
           instructions [15]. The alternative semantics could be applied   current IP-based networks, including  source address
           to a network  overlay [16],  or directly embedded into the   spoofing, privacy leak, trust model  weakness, and
           address field, which is the case in some limited domains [17]   Distributed Denial of Service (DDoS) attacks, which were
           such as LoRaWAN deployments [18] (with their  own   not considered as  one  of the original “seven design
           challenges in terms of ensuring the perimeter of the domains,   principles” [21]. Capabilities have to maximally protect user
           and connecting domains across the Internet).       privacy, consolidate distributed trust basis, and build secure
                                                              and trustable networks, in order to  meet the privacy
           New semantics can be deployed for new capabilities, better   protection requirements represented by GDPR [22] and the
           QoS,  higher flexibility, and  efficiency.  As an example of   security and trustworthiness requirements of industry-wide
           efficiency, embedding service information into the   interconnection. The STRIDE security model [23] can offer
           addressing scheme used for packet delivery [19] can allow   an approach from an architectural point of view [19].
           fast redirection to the “optimal” endpoint without requiring
           Domain Name System (DNS)-level operations as is the case   A  key security aspect  from the network point of  view
           today. New semantics also enable incremental deployment   concerns the need to verify if a packet is authorized to enter
           of  new technologies  on limited domains, for innovative   into the network and if it is sufficiently integrity protected.
           solutions that may or may not penetrate the whole Internet at   Mechanisms for authorization and integrity protection must
           a later stage.                                     be developed to meet the line rate performance as services
                                                              delivered can  be time sensitive.  Homomorphic  forms of
           Although not explicitly related to the application scenarios   encryption may  need to  be devised in  which  network
           described in Section 2, flexible length addressing caters to an   operations can be performed in privacy-preserving manner
           increasing number of  specialized  network deployments:   on encrypted packet headers and tunneled packets without
           driven  by the long-standing recognition of IP header   exposing any of their contents [1].
           overhead, it is about  moving to a variable  length address
           approach [20] that can be efficiently supported alongside the   A security mechanism to verify, authorize, and ensure packet
           global reachability, while ensuring the future extensibility of   integrity  may  also be used with respect  to network
           the hierarchical addressing  used  by the  routing   trustworthiness, including verification of the trustworthiness
           system. Solutions with a flexible length addressing can allow   of the  network  nodes handling the  packets as  well as
           for localized  forwarding based  on short  purpose-oriented   verification of the trustworthiness of the packets themselves.
           addresses (with significant savings - e.g., for IoT networks),
           while enabling interconnection through  a hierarchy  of   Privacy  protection  enabling  mechanisms  include
           addressing that also supports the semantic addressing across   anonymization, opaque user data, secure storage and flow
           domains.                                           anonymization. Appropriate mechanisms  have to address
                                                              relevant issues of current networks: most of the information
           By allowing extensible scopes  for an address,  new   in today’s packet  headers is in the clear and therefore
           functionality can be introduced into the network layer   observable by eavesdroppers; the packets stored in routers’
           without the  need for lengthy standardization of each   buffers are not secured; today it is possible with Deep Packet
           extension.                                         Inspection (DPI) telemetry to determine the type of traffic;
                                                              users are  not  able to reconstruct what happened to their
           Semantic  routing (i.e., the  process of  routing packets  that   packets and data.
           contain  IP  addresses  with additional semantics  [15]) and





                                                           – 51 –
   108   109   110   111   112   113   114   115   116   117   118