A Cluster-Based Secure Active Network Environment

被引:1
|
作者
CHEN Xiao-lin 1
2.State Key Laboratory of Novel Software Technology
机构
关键词
active networks; security; DSM;
D O I
暂无
中图分类号
TP393 [计算机网络];
学科分类号
081201 ; 1201 ;
摘要
We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallelly processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers.
引用
收藏
页码:142 / 146
页数:5
相关论文
共 50 条
  • [31] A Cluster-Based Secure Synchronization Protocol for Underwater Wireless Sensor Networks
    Xu, Ming
    Liu, Guangzhong
    Zhu, Daqi
    Wu, Huafeng
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [32] CSDA: a novel cluster-based secure data aggregation scheme for WSNs
    Fang, Wei
    Wen, XueZhi
    Xu, Jiang
    Zhu, JieZhong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S5233 - S5244
  • [33] Adaptive distributionally robust cluster-based healthcare network design problem under an uncertain environment
    Wang, Luqi
    Yang, Guoqing
    Yang, Ming
    [J]. INFORMATION SCIENCES, 2023, 642
  • [34] Cluster-based secure communication mechanism in wireless ad hoc networks
    Guo, M. -H.
    Liaw, H. -T
    Deng, D. -J.
    Chao, H. -C.
    [J]. IET INFORMATION SECURITY, 2010, 4 (04) : 352 - 360
  • [35] Lethe: Cluster-based Indexing for Secure Multi-User Search
    Micheli, Eirini C.
    Margaritis, Giorgos
    Anastasiadis, Stergios V.
    [J]. 2014 IEEE INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS), 2014, : 323 - 330
  • [36] Dual Trust Secure Protocol for Cluster-based Wireless Sensor Networks
    Yang, Li
    Moh, Melody
    [J]. 2011 CONFERENCE RECORD OF THE FORTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS (ASILOMAR), 2011, : 1645 - 1649
  • [37] A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things (IoTs)
    Imran, Kanwal
    Anjum, Nasreen
    Alghamdi, Abdullah
    Shaikh, Asadullah
    Hamdi, Mohammed
    Mahfooz, Saeed
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 1033 - 1052
  • [38] Secure Cluster-Based SIP Service over Ad hoc Networks
    Abdullah, Lamya
    Almomani, Iman
    Aburumman, Ala'
    [J]. 2013 IEEE JORDAN CONFERENCE ON APPLIED ELECTRICAL ENGINEERING AND COMPUTING TECHNOLOGIES (AEECT), 2013,
  • [39] Secure Cluster-based Cooperative Spectrum Sensing Against Malicious Attackers
    Althunibat, Saud
    Denise, Birawaba J.
    Granelli, Fabrizio
    [J]. 2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1284 - 1289
  • [40] CSDA: a novel cluster-based secure data aggregation scheme for WSNs
    Wei Fang
    XueZhi Wen
    Jiang Xu
    JieZhong Zhu
    [J]. Cluster Computing, 2019, 22 : 5233 - 5244