Co-Governed Sovereignty Network : Legal Basis and Its Prototype and Applications with MIN Architecture.
Main Author: | |
---|---|
Other Authors: | |
Format: | eBook |
Language: | English |
Published: |
Singapore :
Springer Singapore Pte. Limited,
2021.
|
Edition: | 1st ed. |
Subjects: | |
Online Access: | Click to View |
Table of Contents:
- Intro
- Foreword I: From IP to MIN by Prof. Weimin Zheng
- Foreword II: From MINs to Cog-MIN by Prof. S.-Y. R. Li
- Preface
- Acknowledgements
- Contents
- About the Authors
- 1 Sovereignty and Network Sovereignty
- 1.1 Historical Background
- 1.1.1 Origin of Traditional Sovereignty
- 1.1.2 Traditional Sovereignty
- 1.1.3 Mission of Sovereignty
- 1.2 Adaptability of Sovereignty in Cyberspace
- 1.2.1 Composition of Cyberspace
- 1.2.2 Network Sovereignty in the New Era
- 1.3 Exploration of Network Sovereignty
- 1.3.1 Theoretical Contend
- 1.3.2 Exploration and Practice
- 1.4 Overview of Network Sovereignty
- 1.4.1 Legal Connotation of Network Sovereignty
- 1.4.2 Layers of Network Sovereignty
- 1.4.3 Role of Network Sovereignty in Each Stage
- 1.5 Necessity of Advocating Network Sovereignty
- 1.5.1 Necessity of Dividing Information Sovereignty
- 1.5.2 Necessity of Network Territory
- 1.5.3 Necessity of Making Rules Under the Law
- References
- 2 Interpretation of Network Sovereignty
- 2.1 International Community and Network Sovereignty
- 2.2 International Comments on Network Sovereignty
- 2.2.1 Age of Cyber Warfare
- 2.2.2 Governance of Network Sovereignty
- 2.2.3 Strategic Layout of Some States
- 2.3 Safeguarding Network Sovereignty
- 2.3.1 Strengthen the Awareness of National Network Sovereignty
- 2.3.2 Opposing the Theory of Negating Sovereignty in Cyberspace
- 2.3.3 Peace and Stability in Cyberspace
- 2.3.4 Expanding the Network Sovereignty Concept
- 2.4 Current Situation of the Sovereignty of Broadcasting TV Network
- 2.5 The 4th Power: United States Presidential Election in 2020 and Network Sovereignty
- 2.5.1 United States Presidential Election and the Storming of the United States Capitol
- 2.5.2 Social Media Platforms Banned Trump's Accounts
- 2.5.3 Regulating the Power of Social Media Platform.
- References
- 3 Architecture of Sovereignty Network
- 3.1 Sovereignty Network
- 3.1.1 Definition of Sovereignty Network
- 3.1.2 Functional Requirements for Sovereignty Network
- 3.2 Existing Technologies
- 3.2.1 IPv9
- 3.2.2 New IP
- 3.3 Architecture of Sovereignty Network
- 3.3.1 Framework
- 3.3.2 Multi-identifier System
- 3.3.3 Multi-identifier Router
- 3.3.4 Security Situation Awareness System
- 3.4 Processes in Sovereignty Network
- 3.4.1 Registration Process
- 3.4.2 Publishing Content by Ordinary Users
- 3.4.3 Publishing Content by Broadcast Network Staffs
- 3.4.4 Obtaining Content by Ordinary Users
- 3.4.5 Obtaining Content by Broadcast Network Staffs
- 3.4.6 Assessing to Sovereignty Data by Extranet Users
- 3.4.7 Signature Algorithm in MIN
- 3.5 Assessing the Security of Sovereignty Network
- 3.5.1 Anti-attacking Analysis
- 3.5.2 Security Mechanisms
- 3.6 Protocol Architecture of Sovereignty Network
- References
- 4 Key Technologies of Sovereignty Network
- 4.1 Identity Centric Network
- 4.1.1 MIN Based on Identity Centric Network
- 4.1.2 Data Transmission Scheme
- 4.1.3 Process of User Access
- 4.2 Large-Scale Multilateral Managed Consortium Blockchain Technology
- 4.2.1 PoV Consensus Algorithm
- 4.2.2 PoV Consensus Process
- 4.2.3 PoV Hierarchical Signature Mechanism
- 4.3 Routing Scheme for Billions of Multiple Identifiers
- 4.3.1 Border Gateway Protocol
- 4.3.2 Hyperbolic Identifier and Routing Scheme
- 4.3.3 Hash Table with Prefix Tree Algorithm (HPT)
- 4.4 Identity Authentication Scheme Based on Real Identity and Biometric
- 4.4.1 Introduction of User Biological Characteristics
- 4.4.2 Introduction of Each Module
- 4.4.3 Application Scenarios
- 4.5 Privacy Protection and Network Management
- 4.5.1 Electronic Visas of Sovereignty Network
- 4.5.2 Asymmetric Encryptions.
- 4.5.3 Privacy Preserving Policy
- 4.6 Security Situation Awareness System
- 4.6.1 Innovative Points
- 4.6.2 Technical Terms
- 4.6.3 Application Scenarios
- 4.6.4 System Architecture
- 4.7 Security Analysis
- 4.7.1 Security Mechanisms
- 4.7.2 Security Mechanism of Network Architecture
- 4.7.3 Security Mechanism of Network Links
- 4.7.4 Security Mechanism of Core Components
- 4.7.5 Security Gain Brought by Sovereignty Network
- 4.7.6 Conclusion
- 4.8 Transmission Control
- 4.8.1 MIT Design
- 4.8.2 Active Congestion Detection
- 4.8.3 Explicit Congestion Notification
- 4.8.4 Hop-by-Hop Rate Shaping
- 4.8.5 Client Rate Adjustment
- 4.9 Addressing Model for Space-Terrestrial Integrated Networks
- 4.9.1 Hyperbolic Routing Algorithm in Terrestrial Networks
- 4.9.2 Delay-Based Distributed Self-adaptive Routing Algorithm in Satellite Networks
- 4.10 Identifier Extension Technology
- 4.10.1 Basic Formats for Network Packet
- 4.10.2 Identifiers Binding in MIS
- 4.10.3 Identifier Extension Mechanism
- 4.10.4 Procedure of the Packet Processing
- References
- 5 Prototype of Sovereignty Network and Application of Private Network Based on MIN
- 5.1 Experiments of the Prototype System
- 5.1.1 User Registration and Resource Publishing
- 5.1.2 Accessing to IP Internal Network Resource
- 5.1.3 Accessing to External IP Resources
- 5.1.4 Certification Between Sovereignty Networks
- 5.1.5 Data Filtering Function of EMIR
- 5.1.6 E-Mail Transmission in Sovereignty Network
- 5.1.7 Voting Through Blockchain
- 5.2 MIN-Security Reliable Private Network
- 5.2.1 MIN-SRPN
- 5.2.2 Water Utilities System Based on MIN-SRPN
- 5.2.3 The Human Resources Digital Intelligent Service Platform Based MIN
- 5.3 MIN Adopted in the Industrial Internet
- 5.3.1 National Industrial Internet Identifier Resolution System with MIN.
- 5.3.2 National Industrial Internet with MIN
- 5.3.3 Inter-translation of Multiple Network Identifiers
- 5.3.4 Identifier Resolution in Automotive Industrial Internet
- 5.4 Multinational Interconnected Public Network with Co-governing and Sovereignty Autonomy
- 5.4.1 Network Topology
- 5.4.2 Network Communications
- 5.4.3 An Example of the Multinational Interconnected Public Network
- 5.4.4 The United Nations of Cyberspace
- 5.5 Current Work Basis and Future Expansion: Space-Terrestrial Multi-identifier Network
- 5.5.1 Current Work Basis
- 5.5.2 Routing Strategy and Mobility Management Scheme in ST-MIN
- 5.5.3 5G Business
- 5.5.4 Switching Scheme Between Satellite and Gateway Station Based on 6G
- 5.5.5 Experiment and Evaluation of ST-MIN
- References.