Research Article
Security-Oriented Network Architecture
| Notation | Description |
| IDM | Identity manager for managing identity and credentials | AA | Accountability agent for tracking the source identity | IDA | ID authenticator for authenticating an entity | IDR | ID router for verifying host ID authenticity | BR | Border router | HID | Host identifier | I-Loc | Inner locator for routing in the intradomain | O-Loc | Outer locator for routing in the interdomain | EID | Ephemeral and encrypted ID to identify a host | EI-Loc | Encrypted inner locator | EHID | Encrypted host ID | Code | Message authentication code | SAC | Source authentication code for host ID authenticity | DAC | Domain authentication code for domain ID authenticity | LAC | Location authentication code for locator authenticity | AID + Code | Authenticated user identifier and message authentication code | SrcLoc | Source host locator | DstLoc | Destination host locator | SrcDomainID | Source domain identifier | DstDomainID | Destination domain identifier | HK | A symmetric key owned by the host | MACKey | A symmetric key to protect layer-2 data | MK | A symmetric master key owned by border routers | VK and DK | A shared symmetric key to verify authenticity | SK | A symmetric key to encrypt data in IP header | PF | A privacy flag | DF | A dynamic factor which may be randomly generated |
|
|