Co-Governed Sovereignty Network : : Legal Basis and Its Prototype and Applications with MIN Architecture.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Place / Publishing House:Singapore : : Springer Singapore Pte. Limited,, 2021.
Ã2021.
Year of Publication:2021
Edition:1st ed.
Language:English
Online Access:
Physical Description:1 online resource (284 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Intro
  • Foreword I: From IP to MIN by Prof. Weimin Zheng
  • Foreword II: From MINs to Cog-MIN by Prof. S.-Y. R. Li
  • Preface
  • Acknowledgements
  • Contents
  • About the Authors
  • 1 Sovereignty and Network Sovereignty
  • 1.1 Historical Background
  • 1.1.1 Origin of Traditional Sovereignty
  • 1.1.2 Traditional Sovereignty
  • 1.1.3 Mission of Sovereignty
  • 1.2 Adaptability of Sovereignty in Cyberspace
  • 1.2.1 Composition of Cyberspace
  • 1.2.2 Network Sovereignty in the New Era
  • 1.3 Exploration of Network Sovereignty
  • 1.3.1 Theoretical Contend
  • 1.3.2 Exploration and Practice
  • 1.4 Overview of Network Sovereignty
  • 1.4.1 Legal Connotation of Network Sovereignty
  • 1.4.2 Layers of Network Sovereignty
  • 1.4.3 Role of Network Sovereignty in Each Stage
  • 1.5 Necessity of Advocating Network Sovereignty
  • 1.5.1 Necessity of Dividing Information Sovereignty
  • 1.5.2 Necessity of Network Territory
  • 1.5.3 Necessity of Making Rules Under the Law
  • References
  • 2 Interpretation of Network Sovereignty
  • 2.1 International Community and Network Sovereignty
  • 2.2 International Comments on Network Sovereignty
  • 2.2.1 Age of Cyber Warfare
  • 2.2.2 Governance of Network Sovereignty
  • 2.2.3 Strategic Layout of Some States
  • 2.3 Safeguarding Network Sovereignty
  • 2.3.1 Strengthen the Awareness of National Network Sovereignty
  • 2.3.2 Opposing the Theory of Negating Sovereignty in Cyberspace
  • 2.3.3 Peace and Stability in Cyberspace
  • 2.3.4 Expanding the Network Sovereignty Concept
  • 2.4 Current Situation of the Sovereignty of Broadcasting TV Network
  • 2.5 The 4th Power: United States Presidential Election in 2020 and Network Sovereignty
  • 2.5.1 United States Presidential Election and the Storming of the United States Capitol
  • 2.5.2 Social Media Platforms Banned Trump's Accounts
  • 2.5.3 Regulating the Power of Social Media Platform.
  • References
  • 3 Architecture of Sovereignty Network
  • 3.1 Sovereignty Network
  • 3.1.1 Definition of Sovereignty Network
  • 3.1.2 Functional Requirements for Sovereignty Network
  • 3.2 Existing Technologies
  • 3.2.1 IPv9
  • 3.2.2 New IP
  • 3.3 Architecture of Sovereignty Network
  • 3.3.1 Framework
  • 3.3.2 Multi-identifier System
  • 3.3.3 Multi-identifier Router
  • 3.3.4 Security Situation Awareness System
  • 3.4 Processes in Sovereignty Network
  • 3.4.1 Registration Process
  • 3.4.2 Publishing Content by Ordinary Users
  • 3.4.3 Publishing Content by Broadcast Network Staffs
  • 3.4.4 Obtaining Content by Ordinary Users
  • 3.4.5 Obtaining Content by Broadcast Network Staffs
  • 3.4.6 Assessing to Sovereignty Data by Extranet Users
  • 3.4.7 Signature Algorithm in MIN
  • 3.5 Assessing the Security of Sovereignty Network
  • 3.5.1 Anti-attacking Analysis
  • 3.5.2 Security Mechanisms
  • 3.6 Protocol Architecture of Sovereignty Network
  • References
  • 4 Key Technologies of Sovereignty Network
  • 4.1 Identity Centric Network
  • 4.1.1 MIN Based on Identity Centric Network
  • 4.1.2 Data Transmission Scheme
  • 4.1.3 Process of User Access
  • 4.2 Large-Scale Multilateral Managed Consortium Blockchain Technology
  • 4.2.1 PoV Consensus Algorithm
  • 4.2.2 PoV Consensus Process
  • 4.2.3 PoV Hierarchical Signature Mechanism
  • 4.3 Routing Scheme for Billions of Multiple Identifiers
  • 4.3.1 Border Gateway Protocol
  • 4.3.2 Hyperbolic Identifier and Routing Scheme
  • 4.3.3 Hash Table with Prefix Tree Algorithm (HPT)
  • 4.4 Identity Authentication Scheme Based on Real Identity and Biometric
  • 4.4.1 Introduction of User Biological Characteristics
  • 4.4.2 Introduction of Each Module
  • 4.4.3 Application Scenarios
  • 4.5 Privacy Protection and Network Management
  • 4.5.1 Electronic Visas of Sovereignty Network
  • 4.5.2 Asymmetric Encryptions.
  • 4.5.3 Privacy Preserving Policy
  • 4.6 Security Situation Awareness System
  • 4.6.1 Innovative Points
  • 4.6.2 Technical Terms
  • 4.6.3 Application Scenarios
  • 4.6.4 System Architecture
  • 4.7 Security Analysis
  • 4.7.1 Security Mechanisms
  • 4.7.2 Security Mechanism of Network Architecture
  • 4.7.3 Security Mechanism of Network Links
  • 4.7.4 Security Mechanism of Core Components
  • 4.7.5 Security Gain Brought by Sovereignty Network
  • 4.7.6 Conclusion
  • 4.8 Transmission Control
  • 4.8.1 MIT Design
  • 4.8.2 Active Congestion Detection
  • 4.8.3 Explicit Congestion Notification
  • 4.8.4 Hop-by-Hop Rate Shaping
  • 4.8.5 Client Rate Adjustment
  • 4.9 Addressing Model for Space-Terrestrial Integrated Networks
  • 4.9.1 Hyperbolic Routing Algorithm in Terrestrial Networks
  • 4.9.2 Delay-Based Distributed Self-adaptive Routing Algorithm in Satellite Networks
  • 4.10 Identifier Extension Technology
  • 4.10.1 Basic Formats for Network Packet
  • 4.10.2 Identifiers Binding in MIS
  • 4.10.3 Identifier Extension Mechanism
  • 4.10.4 Procedure of the Packet Processing
  • References
  • 5 Prototype of Sovereignty Network and Application of Private Network Based on MIN
  • 5.1 Experiments of the Prototype System
  • 5.1.1 User Registration and Resource Publishing
  • 5.1.2 Accessing to IP Internal Network Resource
  • 5.1.3 Accessing to External IP Resources
  • 5.1.4 Certification Between Sovereignty Networks
  • 5.1.5 Data Filtering Function of EMIR
  • 5.1.6 E-Mail Transmission in Sovereignty Network
  • 5.1.7 Voting Through Blockchain
  • 5.2 MIN-Security Reliable Private Network
  • 5.2.1 MIN-SRPN
  • 5.2.2 Water Utilities System Based on MIN-SRPN
  • 5.2.3 The Human Resources Digital Intelligent Service Platform Based MIN
  • 5.3 MIN Adopted in the Industrial Internet
  • 5.3.1 National Industrial Internet Identifier Resolution System with MIN.
  • 5.3.2 National Industrial Internet with MIN
  • 5.3.3 Inter-translation of Multiple Network Identifiers
  • 5.3.4 Identifier Resolution in Automotive Industrial Internet
  • 5.4 Multinational Interconnected Public Network with Co-governing and Sovereignty Autonomy
  • 5.4.1 Network Topology
  • 5.4.2 Network Communications
  • 5.4.3 An Example of the Multinational Interconnected Public Network
  • 5.4.4 The United Nations of Cyberspace
  • 5.5 Current Work Basis and Future Expansion: Space-Terrestrial Multi-identifier Network
  • 5.5.1 Current Work Basis
  • 5.5.2 Routing Strategy and Mobility Management Scheme in ST-MIN
  • 5.5.3 5G Business
  • 5.5.4 Switching Scheme Between Satellite and Gateway Station Based on 6G
  • 5.5.5 Experiment and Evaluation of ST-MIN
  • References.