Shipping Through the Holidays β˜€οΈπŸ“¦

New Year, New You Sale β˜€οΈ- Up to 20% off 500+ books!

Securing Delay-Tolerant Networks with BPSec

Book Hero Magic crafted this summary to help describe this book. While it's new and still learning, it may not be perfect - your feedback is welcome! Summary
In Securing Delay-Tolerant Networks with BPSec, the authors explore innovative security solutions for networks where consistent connectivity is not guaranteed. They focus on Bundle Protocol Security (BPSec), a method designed to ensure data integrity, confidentiality, and authentication in delay-tolerant networks. The book delves into practical implementations and offers insights into maintaining robust security in challenging environments.
Read More
Format: Hardback
$27699
AVAILABLE WITH SUPPLIER Ships from our Auckland warehouse within 3-4 weeks

Found a better price? Request a price match

Book Hero Magic created this recommendation. While it's new and still learning, it may not be perfect - your feedback is welcome! IS THIS YOUR NEXT READ?

You might enjoy this book if you're interested in understanding the security challenges and solutions for delay-tolerant networks, particularly in computing and technology. It's perfect for those keen on delving into protocols and techniques like Bundle Protocol Security, offering insights into protecting data in challenging communication environments.

Book Hero thinking about your next read

Securing Delay-Tolerant Networks with BPSec

Book Hero Magic formatted this description to make it easier to read. While it's new and still learning, it may not be perfect - your feedback is welcome! Description

Securing Delay-Tolerant Networks with BPSec is your one-stop reference on how to secure a Delay-Tolerant Network (DTN), written by experienced industry insiders.

Securing Delay-Tolerant Networks with BPSec answers the question, "How can delay-tolerant networks be secured when operating in environments that would otherwise break many of the common security approaches used on the terrestrial Internet today?"

The text is composed of three sections: (1) security considerations for delay-tolerant networks, (2) the design, implementation, and customisation of the BPSec protocol, and (3) how this protocol can be applied, combined with other security protocols, and deployed in emerging network environments.

The text includes pragmatic considerations for deploying BPSec in both regular and delay-tolerant networks. It also features a tutorial on how to achieve several important security outcomes with a combination of security protocols, BPSec included.

Overall, it covers best practices for common security functions, clearly showing designers how to prevent network architecture from being over-constrained by traditional security approaches.

Written by the lead author and originator of the BPSec protocol specification, Securing Delay-Tolerant Networks with BPSec includes information on:

  • The gap between cryptography and network security, how security requirements constrain network architectures, and why we need something different.
  • DTN stressing conditions, covering intermittent connectivity, congested paths, partitioned topologies, limited link state, and multiple administrative controls.
  • Securing the terrestrial Internet, involving a layered approach to security, the impact of protocol design on security services, and securing the internetworking and transport layers.
  • A delay-tolerant security architecture, including desirable properties of a DTN secure protocol, fine-grained security services, and protocol augmentation.

Securing Delay-Tolerant Networks with BPSec is a one-stop reference on the subject for any professional operationally deploying BP who must use BPSec for its security. It is invaluable for software technical leads, software developers, space flight mission leaders, network operators, and technology and product development leaders in general.

Book Details

INFORMATION

ISBN: 9781119823476

Publisher: John Wiley & Sons Inc

Format: Hardback

Date Published: 19 December 2022

Country: United States

Imprint: John Wiley & Sons Inc

Audience: Professional and scholarly

DIMENSIONS

Weight: 907g

Pages: 352

About the Author

Dr Edward J. Birrane III, is CTO at Tolerant Network Solutions, LLC, Adjunct Faculty at University of Maryland, Baltimore County, and supervises the embedded applications group of The Johns Hopkins University Applied Physics Laboratory Space Exploration Sector. He received his Ph.D. from the University of Maryland, Baltimore County.

Sarah Heiner is an Embedded Software Engineer at The Johns Hopkins University Applied Physics Laboratory.

Ken McKeever is an Engineer at The Johns Hopkins University Applied Physics Laboratory.

More from Computing & Technology

View all

Why buy from us?

Book Hero is not a chain store or big box retailer. We're an independent 100% NZ-owned business on a mission to help more Kiwis rediscover a love of books and reading!

Service & Delivery

Service & Delivery

Our warehouse in Auckland holds over 80,000 books and puzzles in-stock so you're not waiting for your order to arrive from overseas.

Auckland Bookstore

Auckland Bookstore

We're primarily an online store, but for your convenience you can pick up your order for free from our bookstore, which is right next door to our warehouse in Hobsonville.

Our Gifting Service

Our Gifting Service

Books make wonderful thoughtful gifts and we're here to help with gift-wrapping and cards. We can even send your gift directly to your loved one.