Research and implementation of a scalable secure active network node

被引:0
|
作者
Wang, JG [1 ]
Li, ZZ [1 ]
Kou, YN [1 ]
机构
[1] Xi An Jiao Tong Univ, Inst Comp Architecture & Network, Xian 710049, Peoples R China
关键词
active network; active network node; active application; secure; architecture;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Active networks are packet-switched networks. It allows users to inject customized programs into the intermediate node of the network. The important difference of active network from traditional network is that active network consists of a series of active network nodes that are able to execute active codes and compute them. So, active network node is the key of the architecture of active network. This paper presents a scalable and secure active network node that provides the required flexibility of active network technology for dynamic services customized by users deployment and application-specific data processing and forwarding. In this paper, the composing components and the services request interface and active application API are introduced, which make active network node scalable, the functions of the composing components can be dynamically extended. By describing the process procedure of capsules, we discuss the communication among these composing components. We make the active network node high performance with a new mechanism to load active code. We make the active network node secure by using digital signature and secure execution engine that can authenticate the identities of principals and authorize to control resources accessing.
引用
收藏
页码:111 / 115
页数:5
相关论文
共 50 条
  • [21] Towards Scalable and Realistic Node Models for Network Simulators
    Kristiansen, Stein
    Plagemann, Thomas
    Goebel, Vera
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2011, 41 (04) : 418 - 419
  • [22] Secure route optimization for mobile network node using secure address proxying
    Jo, Manhee
    Inamura, Hiroshi
    2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 137 - 143
  • [23] Design and Implementation of a Secure Social Network System
    Layfield, Ryan
    Thuraisingham, Bhavani
    Khan, Latifur
    Kantarcioglu, Murat
    Rachapalli, Jyothsna
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 236 - 247
  • [24] Design and implementation of a secure social network system
    Layfield, Ryan
    Thuraisingham, Bhavani
    Khan, Laatifur
    Kantarcioglu, Murat
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2009, 24 (02): : 71 - 83
  • [25] Secure and Scalable Group Rekeying for Mobile Multihop Relay Network
    Khan, A. S.
    Abdullah, J.
    Zen, K.
    Tarmizi, S.
    ADVANCED SCIENCE LETTERS, 2017, 23 (06) : 5242 - 5245
  • [26] Towards Robust, Scalable and Secure Network Storage in Cloud Computing
    Al-Anzi, Fawaz S.
    Salman, Ayed A.
    Jacob, Noby K.
    Soni, Jyoti
    2014 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND IT'S APPLICATIONS (DICTAP), 2014, : 51 - 55
  • [27] A Scalable Rekeying Scheme for Secure Multicast in IEEE 802.16 Network
    Chakraborty, Sandip
    Majumder, Soumyadip
    Barbhuiya, Ferdous A.
    Nandi, Sukumar
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 472 - 481
  • [28] FileDES: A Secure, Scalable and Succinct Decentralized Encrypted Storage Network
    Xu, Minghui
    Zhang, Jiahao
    Guo, Hechuan
    Cheng, Xiuzhen
    Yu, Dongxiao
    Hu, Qin
    Li, Yijun
    Wu, Yipu
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 261 - 270
  • [29] A Novel Architecture for Secure and Scalable Multicast over IP Network
    Wei, Yawen
    Yu, Zhen
    Guan, Yong
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2009, 19 : 417 - 436
  • [30] Implementation of a prototype Active Network
    Kulkarni, AB
    Minden, GJ
    Hill, R
    Wijata, Y
    Gopinath, A
    Sheth, S
    Wahhab, F
    Pindi, H
    Nagarajan, A
    1998 IEEE OPEN ARCHITECTURES AND NETWORK PROGRAMMING, 1998, : 130 - 143