Research and implementation of a scalable secure active network node

被引:0
|
作者
Wang, JG [1 ]
Li, ZZ [1 ]
Kou, YN [1 ]
机构
[1] Xi An Jiao Tong Univ, Inst Comp Architecture & Network, Xian 710049, Peoples R China
关键词
active network; active network node; active application; secure; architecture;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Active networks are packet-switched networks. It allows users to inject customized programs into the intermediate node of the network. The important difference of active network from traditional network is that active network consists of a series of active network nodes that are able to execute active codes and compute them. So, active network node is the key of the architecture of active network. This paper presents a scalable and secure active network node that provides the required flexibility of active network technology for dynamic services customized by users deployment and application-specific data processing and forwarding. In this paper, the composing components and the services request interface and active application API are introduced, which make active network node scalable, the functions of the composing components can be dynamically extended. By describing the process procedure of capsules, we discuss the communication among these composing components. We make the active network node high performance with a new mechanism to load active code. We make the active network node secure by using digital signature and secure execution engine that can authenticate the identities of principals and authorize to control resources accessing.
引用
收藏
页码:111 / 115
页数:5
相关论文
共 50 条
  • [41] The conceptual view of unmanned aerial vehicle implementation as a mobile communication node of active data transmission network
    Kuleshov, Sergey V.
    Zaytseva, Alexandra A.
    Aksenov, Alexey Y.
    INTERNATIONAL JOURNAL OF INTELLIGENT UNMANNED SYSTEMS, 2018, 6 (04) : 174 - 183
  • [42] Achieving a scalable and secure software defined network by identifiers separating and mapping
    Wang, Mingxin
    Zhou, Huachun
    Chen, Jia
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2017, 32 (02): : 159 - 169
  • [43] Building Scalable and Secure Multicast Delivery Infrastructure in a Local Area Network
    Veeraraghavan, Prakash
    Hanna, Dalal
    Pardede, Eric
    ELECTRONICS, 2019, 8 (10)
  • [44] A Secure Scalable Authentication Protocol for Access Network Communications using ECC
    Patel, Suyash
    Dua, Amit
    Kumar, Neeraj
    2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
  • [45] Plateau: A Secure and Scalable Overlay Network for Large Distributed Trust Applications
    Augustine, John
    Bhat, Wahid Gulzar
    Nair, Sandip
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS (SSS 2022), 2022, 13751 : 69 - 83
  • [46] Offloading personal security applications to a secure and trusted network node
    Bonafiglia, R.
    Ciaccia, F.
    Lioy, A.
    Nemirovsky, M.
    Risso, F.
    Su, T.
    2015 1ST IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT), 2015,
  • [47] Secure Sensor Node Design for ECG in Body Area Network
    Jose, Teena P.
    Deepthi, P. P.
    PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 2957 - 2961
  • [48] Secure node ID assignment for internet integrated sensor network
    Gautam, Amit Kumar
    Kumar, Rakesh
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2022, 15 (02) : 94 - 106
  • [49] Wireless sensor network security: A secure sink node architecture
    Muhammad, S
    Furqan, Z
    Guha, R
    CONFERENCE PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE, 2005, : 371 - 376
  • [50] Scalable Implementation of Active Detection Mechanism for LAN Based Attacks
    Bansal, G.
    Kumar, N.
    Barbhuiya, F. A.
    Biswas, S.
    Nandi, S.
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 258 - 267