Co-Governed Sovereignty Network
Total Page:16
File Type:pdf, Size:1020Kb
Hui Li · Xin Yang Co-governed Sovereignty Network Legal Basis and Its Prototype & Applications with MIN Architecture 多边共管主权互联网 法理依据及其基于 MIN 架构体系的原型和应用 Co-governed Sovereignty Network Hui Li • Xin Yang Co-governed Sovereignty Network Legal Basis and Its Prototype & Applications with MIN Architecture 123 Hui Li Xin Yang Shenzhen Graduate School Shenzhen Graduate School Peking University Peking University Shenzhen, China Shenzhen, China ISBN 978-981-16-2669-2 ISBN 978-981-16-2670-8 (eBook) https://doi.org/10.1007/978-981-16-2670-8 © The Editor(s) (if applicable) and The Author(s) 2021. This book is an open access publication. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adap- tation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the book’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publi- cation does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore To: The People’s Republic of China and every Chinese around the world. All people, nations, and organizations who love peaceful, secure, open, and cooperative cyberspace. The coming United Nations of Cyberspace with democracy and rule of law. Foreword I: From IP to MIN by Prof. Weimin Zheng National sovereignty is the basic subject of the theory and practice of contemporary international law, which occupies an important position. In more than 50 years since the emergency of the Internet, the formed cyberspace has become another important basic space following the land, sea, air, and space. Scholars at home and abroad have made a series of achievements in the study of sovereignty in the Internet era, which is of great theoretical significance for promoting the interna- tional governance of cyberspace. But on the whole, the research on the sovereignty in the Internet age is still in its infancy. Confronted with the understanding and practice of network sovereignty, taking national sovereignty as a starting point to promote the formulation of the interna- tional code of conduct on the Internet is the best choice that conforms to the interests of most states. In terms of regime, it is necessary to form the legal countermeasures and suggestions to safeguard international cyberspace sovereignty. It is important to shape a cyberspace governance system that is in line with the development realities of all countries. In terms of technology, only by proposing a new network architecture, equal and multilateral cooperative governance among states and sovereignty autonomy in the field of the cyberspace can be realized. The proposed sovereignty network is an effective means to realize sovereignty autonomy in cyberspace and end centralized management under a single IP iden- tifier. At the same time, current and future needs are better met than IP network due to its identity-centric multi-identifier system, endogenous security architecture, real identity authentication, and privacy protection mechanism for all of the access entity, etc. In this book, the authors start with traditional sovereignty, cyberspace sover- eignty, and its scientific basis, followed by the detailed introduction of the future co-governed sovereignty network with multi-identifier system from the aspects of definition, architecture, operating process, security analysis, and relevant protocols. The book also introduced the key technology of network sovereignty, such as identity-centric network, blockchain, security mechanisms, and other performance guarantee. At present, MIN has passed the principle verification on the large-scale operator network. The prototype of broadcasting and television sovereignty vii viii Foreword I: From IP to MIN by Prof. Weimin Zheng network has also passed the test report of the Planning Academy of the National Radio and Television Administration. The primary application scenarios of MIN are government, military, large enterprises with a high standard for security, as well as private network in the financial, electric, and other vital industry. With further developing, the wide deployment of MIN will constitute the United Nations of Cyberspace with independent sovereignty. In October 2019, MIN architecture and its prototype proposed by Prof. Hui Li’s team were rewarded as the leading technology achievements of the 6th World Internet Conference, Wuzhen, China. MIN won the award for two historical first times: the first award for the original and subversive network architecture protocol system, and the first award given to large-scale prototype systems without mature commercial products and systems. Every year, the award goes to Huawei, ZTE, Tencent, Baidu, Alibaba, 360, Microsoft, Google, Qualcomm, Tesla, Ericsson, and Oracle. This also confirms the expectation of academia and industry on this technology. From two dimensions of legal theory and technology, the book analyzes and explores the theoretical basis and practical application of sovereignty network. It is the related important resources for network security management, network con- struction, as well as managers and practitioners. At the same time, for security, network engineering, network space communications professional postgraduate, and senior undergraduate, this book also extremely has the reference value. March 2021 Weimin Zheng Professor of Tsinghua University Academician of Chinese Academy of Engineering; Former President of China Computer Federation Tsinghua Campus, Beijing, China Foreword II: From MINs to Cog-MIN by Prof. S.-Y. R. Li The IPv4 network was formally proposed in 1969. With the rapid development of Internet, the exhaustion of the IPv4 address space in the 2010s hindered the fur- therance of Internet. To expand the address space, IETF in 1995 proposed RFC 1883, marking the birth of IPv6. However, after more than a decade of transition, IPv6 has not completely replaced IPv4 and, in fact, is still expected to coexist with IPv4 for a long time. IPv4 binds user identity with location. This disadvantage remains with IPv6. As early as 1989, there had been study on revolutionary post-IP architecture. In August 2010, the US government began to fund the research on the Future Internet Architecture of post-IP. Soon Europe, Japan, Korea, and China all followed up. Exemplifying projects included the content-centric network named data net- working (NDN), the identification-centric network mobility first, the service-centric network NEBULA, etc. In all proposals on future network architecture, the existing IPv4 domain name system (DNS) remained the basic anchor to supplements of new identities. The problem of centralized management of the network domain name was set aside. The identification domain name is the new territorial space after land, sea, and sky. In establishing a universal global network architecture in the post-IP era, Prof. Hui Li advocates three key points. First is national sovereignty on the virtual network space in replacement of the monopoly by a single country or organization. The top-level identity domain name must be jointly governed by international parties. When the top-level identity domain name of a nation is approved by consensus, the nation owns autonomy on low-level identification domain names. Secondly, all individual or organization users, all operators, and their devices must register a uniform ID in the cyberspace with real identity information. Thirdly, the network must be able to trace the source of every data packet so as to keep everybody responsible. The entire virtual space thus transforms from the current exclave into law abiding territory. National cyberspace will be governed by the territorial law and globally shared space by the international law. ix x Foreword II: From MINs to Cog-MIN by Prof. S.-Y. R. Li Professor Hui Li was a star student at the Department of Information Engineering, The Chinese University of Hong Kong, where he completed the Ph.D. studies in 2000. His doctoral dissertation “On the Complexity of Concentrators and Multi-Stage Interconnection Networks in Switching Systems” was nominated for the Best Doctoral Thesis of the Year. Based on algebraic theory, he completed