Co-Governed Sovereignty Network : : Legal Basis and Its Prototype and Applications with MIN Architecture.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Place / Publishing House:Singapore : : Springer Singapore Pte. Limited,, 2021.
Ã2021.
Year of Publication:2021
Edition:1st ed.
Language:English
Online Access:
Physical Description:1 online resource (284 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 07946nam a22004213i 4500
001 5006684530
003 MiAaPQ
005 20240229073842.0
006 m o d |
007 cr cnu||||||||
008 240229s2021 xx o ||||0 eng d
020 |a 9789811626708  |q (electronic bk.) 
020 |z 9789811626692 
035 |a (MiAaPQ)5006684530 
035 |a (Au-PeEL)EBL6684530 
035 |a (OCoLC)1262726674 
040 |a MiAaPQ  |b eng  |e rda  |e pn  |c MiAaPQ  |d MiAaPQ 
050 4 |a TK5105.5-5105.9 
100 1 |a Li, Hui. 
245 1 0 |a Co-Governed Sovereignty Network :  |b Legal Basis and Its Prototype and Applications with MIN Architecture. 
250 |a 1st ed. 
264 1 |a Singapore :  |b Springer Singapore Pte. Limited,  |c 2021. 
264 4 |c Ã2021. 
300 |a 1 online resource (284 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Intro -- Foreword I: From IP to MIN by Prof. Weimin Zheng -- Foreword II: From MINs to Cog-MIN by Prof. S.-Y. R. Li -- Preface -- Acknowledgements -- Contents -- About the Authors -- 1 Sovereignty and Network Sovereignty -- 1.1 Historical Background -- 1.1.1 Origin of Traditional Sovereignty -- 1.1.2 Traditional Sovereignty -- 1.1.3 Mission of Sovereignty -- 1.2 Adaptability of Sovereignty in Cyberspace -- 1.2.1 Composition of Cyberspace -- 1.2.2 Network Sovereignty in the New Era -- 1.3 Exploration of Network Sovereignty -- 1.3.1 Theoretical Contend -- 1.3.2 Exploration and Practice -- 1.4 Overview of Network Sovereignty -- 1.4.1 Legal Connotation of Network Sovereignty -- 1.4.2 Layers of Network Sovereignty -- 1.4.3 Role of Network Sovereignty in Each Stage -- 1.5 Necessity of Advocating Network Sovereignty -- 1.5.1 Necessity of Dividing Information Sovereignty -- 1.5.2 Necessity of Network Territory -- 1.5.3 Necessity of Making Rules Under the Law -- References -- 2 Interpretation of Network Sovereignty -- 2.1 International Community and Network Sovereignty -- 2.2 International Comments on Network Sovereignty -- 2.2.1 Age of Cyber Warfare -- 2.2.2 Governance of Network Sovereignty -- 2.2.3 Strategic Layout of Some States -- 2.3 Safeguarding Network Sovereignty -- 2.3.1 Strengthen the Awareness of National Network Sovereignty -- 2.3.2 Opposing the Theory of Negating Sovereignty in Cyberspace -- 2.3.3 Peace and Stability in Cyberspace -- 2.3.4 Expanding the Network Sovereignty Concept -- 2.4 Current Situation of the Sovereignty of Broadcasting TV Network -- 2.5 The 4th Power: United States Presidential Election in 2020 and Network Sovereignty -- 2.5.1 United States Presidential Election and the Storming of the United States Capitol -- 2.5.2 Social Media Platforms Banned Trump's Accounts -- 2.5.3 Regulating the Power of Social Media Platform. 
505 8 |a References -- 3 Architecture of Sovereignty Network -- 3.1 Sovereignty Network -- 3.1.1 Definition of Sovereignty Network -- 3.1.2 Functional Requirements for Sovereignty Network -- 3.2 Existing Technologies -- 3.2.1 IPv9 -- 3.2.2 New IP -- 3.3 Architecture of Sovereignty Network -- 3.3.1 Framework -- 3.3.2 Multi-identifier System -- 3.3.3 Multi-identifier Router -- 3.3.4 Security Situation Awareness System -- 3.4 Processes in Sovereignty Network -- 3.4.1 Registration Process -- 3.4.2 Publishing Content by Ordinary Users -- 3.4.3 Publishing Content by Broadcast Network Staffs -- 3.4.4 Obtaining Content by Ordinary Users -- 3.4.5 Obtaining Content by Broadcast Network Staffs -- 3.4.6 Assessing to Sovereignty Data by Extranet Users -- 3.4.7 Signature Algorithm in MIN -- 3.5 Assessing the Security of Sovereignty Network -- 3.5.1 Anti-attacking Analysis -- 3.5.2 Security Mechanisms -- 3.6 Protocol Architecture of Sovereignty Network -- References -- 4 Key Technologies of Sovereignty Network -- 4.1 Identity Centric Network -- 4.1.1 MIN Based on Identity Centric Network -- 4.1.2 Data Transmission Scheme -- 4.1.3 Process of User Access -- 4.2 Large-Scale Multilateral Managed Consortium Blockchain Technology -- 4.2.1 PoV Consensus Algorithm -- 4.2.2 PoV Consensus Process -- 4.2.3 PoV Hierarchical Signature Mechanism -- 4.3 Routing Scheme for Billions of Multiple Identifiers -- 4.3.1 Border Gateway Protocol -- 4.3.2 Hyperbolic Identifier and Routing Scheme -- 4.3.3 Hash Table with Prefix Tree Algorithm (HPT) -- 4.4 Identity Authentication Scheme Based on Real Identity and Biometric -- 4.4.1 Introduction of User Biological Characteristics -- 4.4.2 Introduction of Each Module -- 4.4.3 Application Scenarios -- 4.5 Privacy Protection and Network Management -- 4.5.1 Electronic Visas of Sovereignty Network -- 4.5.2 Asymmetric Encryptions. 
505 8 |a 4.5.3 Privacy Preserving Policy -- 4.6 Security Situation Awareness System -- 4.6.1 Innovative Points -- 4.6.2 Technical Terms -- 4.6.3 Application Scenarios -- 4.6.4 System Architecture -- 4.7 Security Analysis -- 4.7.1 Security Mechanisms -- 4.7.2 Security Mechanism of Network Architecture -- 4.7.3 Security Mechanism of Network Links -- 4.7.4 Security Mechanism of Core Components -- 4.7.5 Security Gain Brought by Sovereignty Network -- 4.7.6 Conclusion -- 4.8 Transmission Control -- 4.8.1 MIT Design -- 4.8.2 Active Congestion Detection -- 4.8.3 Explicit Congestion Notification -- 4.8.4 Hop-by-Hop Rate Shaping -- 4.8.5 Client Rate Adjustment -- 4.9 Addressing Model for Space-Terrestrial Integrated Networks -- 4.9.1 Hyperbolic Routing Algorithm in Terrestrial Networks -- 4.9.2 Delay-Based Distributed Self-adaptive Routing Algorithm in Satellite Networks -- 4.10 Identifier Extension Technology -- 4.10.1 Basic Formats for Network Packet -- 4.10.2 Identifiers Binding in MIS -- 4.10.3 Identifier Extension Mechanism -- 4.10.4 Procedure of the Packet Processing -- References -- 5 Prototype of Sovereignty Network and Application of Private Network Based on MIN -- 5.1 Experiments of the Prototype System -- 5.1.1 User Registration and Resource Publishing -- 5.1.2 Accessing to IP Internal Network Resource -- 5.1.3 Accessing to External IP Resources -- 5.1.4 Certification Between Sovereignty Networks -- 5.1.5 Data Filtering Function of EMIR -- 5.1.6 E-Mail Transmission in Sovereignty Network -- 5.1.7 Voting Through Blockchain -- 5.2 MIN-Security Reliable Private Network -- 5.2.1 MIN-SRPN -- 5.2.2 Water Utilities System Based on MIN-SRPN -- 5.2.3 The Human Resources Digital Intelligent Service Platform Based MIN -- 5.3 MIN Adopted in the Industrial Internet -- 5.3.1 National Industrial Internet Identifier Resolution System with MIN. 
505 8 |a 5.3.2 National Industrial Internet with MIN -- 5.3.3 Inter-translation of Multiple Network Identifiers -- 5.3.4 Identifier Resolution in Automotive Industrial Internet -- 5.4 Multinational Interconnected Public Network with Co-governing and Sovereignty Autonomy -- 5.4.1 Network Topology -- 5.4.2 Network Communications -- 5.4.3 An Example of the Multinational Interconnected Public Network -- 5.4.4 The United Nations of Cyberspace -- 5.5 Current Work Basis and Future Expansion: Space-Terrestrial Multi-identifier Network -- 5.5.1 Current Work Basis -- 5.5.2 Routing Strategy and Mobility Management Scheme in ST-MIN -- 5.5.3 5G Business -- 5.5.4 Switching Scheme Between Satellite and Gateway Station Based on 6G -- 5.5.5 Experiment and Evaluation of ST-MIN -- References. 
588 |a Description based on publisher supplied metadata and other sources. 
590 |a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.  
655 4 |a Electronic books. 
700 1 |a Yang, Xin. 
776 0 8 |i Print version:  |a Li, Hui  |t Co-Governed Sovereignty Network  |d Singapore : Springer Singapore Pte. Limited,c2021  |z 9789811626692 
797 2 |a ProQuest (Firm) 
856 4 0 |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6684530  |z Click to View