A technical solution for the rule of law, peace, security, and evolvability of global cyberspace -- solve the three genetic defects of IP network

Zapisane w:
Opis bibliograficzny
Wydane w:arXiv.org (Dec 14, 2024), p. n/a
1. autor: Li, Hui
Kolejni autorzy: Li, Kedan, Lv, Jiaqing, Liang, Yuanshao, Han, Feng, Li, Shuo-Yen Robert
Wydane:
Cornell University Library, arXiv.org
Hasła przedmiotowe:
Dostęp online:Citation/Abstract
Full text outside of ProQuest
Etykiety: Dodaj etykietę
Nie ma etykietki, Dołącz pierwszą etykiete!

MARC

LEADER 00000nab a2200000uu 4500
001 3145907483
003 UK-CbPIL
022 |a 2331-8422 
035 |a 3145907483 
045 0 |b d20241214 
100 1 |a Li, Hui 
245 1 |a A technical solution for the rule of law, peace, security, and evolvability of global cyberspace -- solve the three genetic defects of IP network 
260 |b Cornell University Library, arXiv.org  |c Dec 14, 2024 
513 |a Working Paper 
520 3 |a Since its inception in the 1960s, the internet has profoundly transformed human life. However, its original design now struggles to meet the evolving demands of modern society. Three primary defects have emerged: First, the concentration of power among a few dominant entities has intensified international conflicts and widened the technological divide. Second, the Internet Protocol (IP)-based system lacks inherent security, leading to frequent global cybersecurity incidents. Third, the rigidity of the IP protocol has hindered the sustainable development of cyberspace, as it resists necessary adaptations and innovations. Addressing these issues is crucial for the future resilience and security of the global digital landscape. To address these challenges, we propose the Co-governed Multi-Identifier Network (CoG-MIN briefly as MIN), a novel network architecture that leverages blockchain technology to ensure equal participation of countries worldwide in cyberspace governance and the rule of law. As a next-generation network system, CoG-MIN integrates mechanisms such as user authentication, data signatures, and encryption to significantly enhance network security. In testing environments, CoG-MIN has consistently withstood extensive attacks during various international cybersecurity competitions. Additionally, CoG-MIN supports the evolution and interoperability of different identifier systems, remains IP-compatible, and facilitates a gradual transition away from IP, providing an adaptable ecosystem for diverse network architectures. This adaptability fosters the development and evolution of diverse network architectures within CoG-MIN, making it a natural progression for the internet's future development. We further introduce a trilogy of cyberspace security theorems... (Due to character limitations, the full abstract is available in the paper PDF.) 
653 |a Cybersecurity 
653 |a Rule of law 
653 |a Sustainable development 
653 |a IP (Internet Protocol) 
653 |a Defects 
653 |a Internet Protocol 
700 1 |a Li, Kedan 
700 1 |a Lv, Jiaqing 
700 1 |a Liang, Yuanshao 
700 1 |a Han, Feng 
700 1 |a Li, Shuo-Yen Robert 
773 0 |t arXiv.org  |g (Dec 14, 2024), p. n/a 
786 0 |d ProQuest  |t Engineering Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3145907483/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full text outside of ProQuest  |u http://arxiv.org/abs/2412.10722