A Secure Active Network Environment architecture: Realization in SwitchWare

被引:42
|
作者
Alexander, DS [1 ]
Arbaugh, WA [1 ]
Keromytis, AD [1 ]
Smith, JM [1 ]
机构
[1] Univ Penn, CIS Dept, Philadelphia, PA 19104 USA
来源
IEEE NETWORK | 1998年 / 12卷 / 03期
关键词
D O I
10.1109/65.690960
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An active network is a network infrastructure which is programmable on a per-user or even per-packet basis. Increasing the flexibility of such network infrastructures invites new security risks. Coping with these security risks represents the most fundamental contribution of active network research.;The security concerns can be divided into those which affect the network as a whole and those which affect individual elements. It is clear that the element problems must be solved first, since the integrity of network-level solutions will be based on trust in the network elements. In this article we describe the architecture and implementation of a Secure Active Network Environment (SANE), which we believe provides a basis for implementing secure network-level solutions. We guarantee that a node begins operation in a trusted state with the AEGIS secure bootstrap architecture. We guarantee that the system remains in a trusted state by applying dynamic integrity checks in the network element's runtime system, using a novel naming system, and applying node-to-node authentication when needed.
引用
收藏
页码:37 / 45
页数:9
相关论文
共 50 条
  • [41] The Biometric System Models with Secure Network Protocols in Open Network Environment
    Shin, Woochang
    Shin, Yong-Nyuo
    SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 155 - 158
  • [42] Towards a secure and lightweight network function virtualisation environment
    Benedictis, Marco De
    Lioy, Antonio
    Smiraglia, Paolo
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2020, 11 (02) : 243 - 252
  • [43] Guaranteeing Secure Communication in OFDM Network with an Active Eavesdropper
    Javan, Mohammad Reza
    2014 7th International Symposium on Telecommunications (IST), 2014, : 868 - 872
  • [44] Experimental realization of an entanglement access network and secure multi-party computation
    X.-Y. Chang
    D.-L. Deng
    X.-X. Yuan
    P.-Y. Hou
    Y.-Y. Huang
    L.-M. Duan
    Scientific Reports, 6
  • [45] Experimental realization of an entanglement access network and secure multi-party computation
    Chang, X. -Y.
    Deng, D. -L.
    Yuan, X. -X.
    Hou, P. -Y.
    Huang, Y. -Y.
    Duan, L. -M.
    SCIENTIFIC REPORTS, 2016, 6
  • [46] Secrecy and Robustness for Active Attack in Secure Network Coding
    Hayashi, Masahito
    Owari, Masaki
    Kato, Go
    Cai, Ning
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 1172 - 1176
  • [47] Guaranteeing secure communication in OFDM network with an active eavesdropper
    Javan, Mohammad Reza
    2014 7th International Symposium on Telecommunications, IST 2014, 2014, : 868 - 872
  • [48] Research and implementation of a scalable secure active network node
    Wang, JG
    Li, ZZ
    Kou, YN
    2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, 2002, : 111 - 115
  • [49] Network-centric architecture to enable secure communications and discovery
    Cunningham, D
    Anderson, J
    Medairy, B
    2004 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-6, 2004, : 3190 - 3196
  • [50] Energy efficient secure communication architecture for wireless sensor network
    Mondal, Satyajit
    Mohanty, Sraban Kumar
    Nandi, Sukumar
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3314 - 3323