A technical solution for the rule of law, peace, security, and evolvability of global cyberspace -- solve the three genetic defects of IP network
Zapisane w:
| Wydane w: | arXiv.org (Dec 14, 2024), p. n/a |
|---|---|
| 1. autor: | |
| Kolejni autorzy: | , , , , |
| Wydane: |
Cornell University Library, arXiv.org
|
| Hasła przedmiotowe: | |
| Dostęp online: | Citation/Abstract Full text outside of ProQuest |
| Etykiety: |
Nie ma etykietki, Dołącz pierwszą etykiete!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3145907483 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 2331-8422 | ||
| 035 | |a 3145907483 | ||
| 045 | 0 | |b d20241214 | |
| 100 | 1 | |a Li, Hui | |
| 245 | 1 | |a A technical solution for the rule of law, peace, security, and evolvability of global cyberspace -- solve the three genetic defects of IP network | |
| 260 | |b Cornell University Library, arXiv.org |c Dec 14, 2024 | ||
| 513 | |a Working Paper | ||
| 520 | 3 | |a Since its inception in the 1960s, the internet has profoundly transformed human life. However, its original design now struggles to meet the evolving demands of modern society. Three primary defects have emerged: First, the concentration of power among a few dominant entities has intensified international conflicts and widened the technological divide. Second, the Internet Protocol (IP)-based system lacks inherent security, leading to frequent global cybersecurity incidents. Third, the rigidity of the IP protocol has hindered the sustainable development of cyberspace, as it resists necessary adaptations and innovations. Addressing these issues is crucial for the future resilience and security of the global digital landscape. To address these challenges, we propose the Co-governed Multi-Identifier Network (CoG-MIN briefly as MIN), a novel network architecture that leverages blockchain technology to ensure equal participation of countries worldwide in cyberspace governance and the rule of law. As a next-generation network system, CoG-MIN integrates mechanisms such as user authentication, data signatures, and encryption to significantly enhance network security. In testing environments, CoG-MIN has consistently withstood extensive attacks during various international cybersecurity competitions. Additionally, CoG-MIN supports the evolution and interoperability of different identifier systems, remains IP-compatible, and facilitates a gradual transition away from IP, providing an adaptable ecosystem for diverse network architectures. This adaptability fosters the development and evolution of diverse network architectures within CoG-MIN, making it a natural progression for the internet's future development. We further introduce a trilogy of cyberspace security theorems... (Due to character limitations, the full abstract is available in the paper PDF.) | |
| 653 | |a Cybersecurity | ||
| 653 | |a Rule of law | ||
| 653 | |a Sustainable development | ||
| 653 | |a IP (Internet Protocol) | ||
| 653 | |a Defects | ||
| 653 | |a Internet Protocol | ||
| 700 | 1 | |a Li, Kedan | |
| 700 | 1 | |a Lv, Jiaqing | |
| 700 | 1 | |a Liang, Yuanshao | |
| 700 | 1 | |a Han, Feng | |
| 700 | 1 | |a Li, Shuo-Yen Robert | |
| 773 | 0 | |t arXiv.org |g (Dec 14, 2024), p. n/a | |
| 786 | 0 | |d ProQuest |t Engineering Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3145907483/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full text outside of ProQuest |u http://arxiv.org/abs/2412.10722 |