Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication
This section describes developments in the area of Internet protocols, so called “Next Generation Internet Protocols”, NGIP. The Internet nowadays relies on protocols which for the most part have been developed some decades ago. The very important TCP protocol was standardised in the 1970s. The 1980s brought the IP, DNS and SMTP protocol specifications. POP3 dates back to the mid 1990s, similarly with the first HTTP description. Protocols like WLAN or IPv6 are of much younger age, but these protocols on the lower layers are still used by the older protocols on higher layers mentioned before.
The older protocols have especially been created within a totally different context than is existing today. When TCP was created, for example, Quality of Service was not an important topic, and SMTP was built with a small and rather closed community of users in mind. Authentication was not crucial back then. This “weak design” is one of the main reasons SPAM could evolve in the way it did. Another example is content delivery of the WWW. Proxies, load-balancing, content-transformation servers and other techniques aiming at delivering content from a virtual host to the clients require sophisticated approaches which are often proprietary and thus violate the original Internet design, architecture and philosophy (Cheriton, Gritter 2000).
It is important to design new protocols in order to straighten out protocol flaws created tens of years ago. Furthermore, since usage patterns have changed rapidly in the last years, new protocols must support new user demands so that novel applications can be developed and deployed, as well as allowing current applications like streaming media to be utilised without bringing the WWW we know to its knees. And last but not least, a new Internet architecture is important in order to provide more security necessary for governance, commerce and user-privacy.
Section hypothesises that privacy experts usually do not participate in the design of protocols, although this may be necessary to conduct a proper privacy impact analysis beforehand.
The following subsections introduce main approaches in the area of Next Generation Internet protocols, i.e., Internet2, GÉANT2, TRIAD and FIND.
schulte | 19 / 30 |