Future Internet

Latifi, Shpëtim
January 2013
International Journal of Applied Science & Technology;Jan2013, Vol. 3 Issue 1, p50
Academic Journal
Historically, the Internet architecture developed decades ago has been evolving ever since, and as a result, some issues and problems that could have not been foreseen or predicted a few decades ago are now appearing; some principles like end-to-end connectivity have been violated, and in the meantime new issues are emerging - identity and authentication, security, mobility, energy efficiency, etc. While recently there are calls for changes in the current Internet architecture, we stress the hidden risks and additional issues related to these ideas, including but not limited to network complexity, concerns about privacy, lack of guarantees for security, and discouragement for Internet access to ordinary people, and discouragement for developing new applications for the developers. This paper/study instead, maintains that the approach of patching the current architecture - firewalls, proxies, and other middle boxes are helpful and do not increase the complexity, thus do not endanger the evolvability and simplicity of the network. We believe that by better and more global laws the security issues will be minimized - this is what even the most advanced ideas for new architectures call for, since there are no guarantees for absolute security. The integration with cell phone networks and services can solve majority of existing issues with mobility, and energy efficiency. Also models for naming, multicast and anycast are also proposed, and as the need for mobility is growing, together with the need for better identification of data and services instead of machines, these models will emerge slowly. This industry is in the beginning of its era, and there are some great solutions on issues related to mobile support for smartphone devices, and we believe this field is moving in the right direction, thus rejecting the need for major changes in the current architecture.


Related Articles

  • Net users slow to act on privacy. Jesdanun, Anick // Long Island Business News (7/1993 to 5/2009);08/25/2000, Vol. 47 Issue 34, p47A 

    Reports on the findings of the survey conducted by the Pew Internet and American Life Project which reveals that majority of Internet users in the United States worry about their privacy, yet few take basic precautions while they surf. Users' lack of understanding on how the Internet works.

  • Think inside the box. Mayne, Mark // SC Magazine: For IT Security Professionals (UK Edition);Apr2009, p39 

    This article discusses a computer architecture called unified threat management (UTM). According to the article, the main UTM architecture combines a firewall, anti-virus and anti-spyware. It indicates some features added to UTM devices, including Transport Layer Security (TLS), virtual private...

  • Fighting security battles locally. Messmer, Ellen // Network World;12/15/2008, Vol. 25 Issue 48, p8 

    The article discusses issues related to data protection and computer security in Arizona. It tackles the creation of state-level positions for chief information security officer (CISO) and chief privacy officer (CPO) by the state government. It explores the citywide computer-use policy and the...

  • Protocols Guide: Network Security Technologies and Protocols: Secured Routing Protocols: IPsec ISAKMP: Internet Security Association and Key Management Protocol.  // Network Protocols Handbook;2007, p100 

    Information on the Internet Security Association and Key Management Protocol (ISAKMP) from a chapter of the book "Network Protocols Handbook," Fourth Edition is presented. ISAKMP is a key protocol in the Internet security architecture that combines security concepts of authentication, key...

  • Model-based Vulnerability Analysis of IMS Network. Dong Wang; Chen Liu // Journal of Networks;Jun2009, Vol. 4 Issue 4, p254 

    IP Multimedia Subsystem (IMS) as the core of Next Generation Network (NGN), its security is vital important. However, IMS is a network with open-architecture based on IP, which brings a lot of security issues. There has already some research results about IMS security, but systematic and...

  • Failing Internet Security.  // Security: Solutions for Enterprise Security Leaders;Sep2001, Vol. 38 Issue 9, p13 

    Reports on the status of Internet security in the U.S. Importance of specific legislation to ensure Internet protection; Application of theft and privacy laws.

  • Caveat emptor: Internet privacy poorly protected. Mcnulty, Michael // Inside Tucson Business;01/17/2000, Vol. 9 Issue 43, p15B 

    Discusses concerns about Internet privacy in the United States. Details regarding the uses of the Internet in accessing information and services; US Federal Trade Commission's establishment of an Advisory Committee on Online Access and Security, charged with considering the parameters of...

  • KNOW WHAT'S LURKING ON YOUR WEB SITE. Jaffe, Brian D. // eWeek;10/30/2000, Vol. 17 Issue 44, p72 

    Relates the author's experience with Internet privacy. Concerns over the posting of personal information on a Web site; Actions taken to address what he considered as a breach of privacy; Potential exposure of companies from liability due to use of data in their Web sites.

  • New online privacy alliance puts out guidelines. Engelke, Roger // Electronic Design;09/14/98, Vol. 46 Issue 21, p25 

    Reports on the formation of Online Privacy Alliance, a coalition aimed to protect the online privacy of individuals. Guidelines released by the organization for online privacy; Implementation of privacy principles by members of the alliance.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics