Skip to main content

Design of Security Enforcement Engine for Active Nodes in Active Networks

  • Conference paper
Information Networking (ICOIN 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2662))

Included in the following conference series:

  • 731 Accesses

Abstract

Active networks are a new generation of networks based on a software-intensive network architecture in which applications are able to inject new strategies or code the infrastructure to their immediate needs. Therefore, the secure and safe active node architecture is needed to give the capability defending an active node against threats that may be more dynamic and powerful than those in traditional networks. To secure active networks, the security enforcement engine is proposed in this paper. We implemented our engine with security, authentication and authorization modules. Using this engine, it is possible that active networks are protected from threats of the malicious active node.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tennenhouse, D.L., et al.: A Survey of Active Network Research. IEEE Communications Magazine, 80–86 (January 1997)

    Google Scholar 

  2. Psounis, K.: Active Network: Applications, Security, Safety, and Architecture. IEEE Communications Serveys (1999)

    Google Scholar 

  3. Security Architecture for Active Nets by AN Security Working Group (1998); Modified by Seraphim Group (2000)

    Google Scholar 

  4. Campbell, R.H., et al.: Seraphim: Dynamic Interoperable Security Architecture for Active Networks. In: IEEE OPENARCH 2000, Tel-Aviv, Israel (March 2000)

    Google Scholar 

  5. Dang, L.: CANSA (Certificate Active Network Security Architecture). Basser Department of Computer Science, University of Sydney (1998)

    Google Scholar 

  6. Wood, M., et al.: Intrusion Detection Message Exchange Requirements:draftietf- idwg-requirements-10.txt, October 22 (2002)

    Google Scholar 

  7. Defense Advanced Research Projects Agency, http://www.darpa.mil/ato/programs/activenetworks/actnet.htm

  8. Scot, A.D., et al.: Active Network Encapsulation Protocol (ANEP). Active Network Group Draft (July 1997)

    Google Scholar 

  9. Ellison, C., et al.: SPKI Certificate Theory: rfc2693.txt (September 1999)

    Google Scholar 

  10. Clifford Neuman, B., et al.: Kerberos: An Authentication Service for Computer Networks. IEEE Communications Magazine 32(9), 33–38 (1994)

    Article  Google Scholar 

  11. Housley, R., et al.: Internet X.509 Public Key Infrastructure: X.509 Certificate and CRL Profile. RFC 2459 (January 1999)

    Google Scholar 

  12. Berson, S., et al.: Evolution of an Active Networks Testbed. Presentation at DARPA Active Networks Conference and Exposition 2002, San Francisco, CA, May 29-30 (2002)

    Google Scholar 

  13. Rivest, R.: The MD5 Message-Digest Algorithm. RFC 1321, MIT Laboratory for Computer Science and RSA Data Security, Inc. (April 1999)

    Google Scholar 

  14. ANSI X3.106-1983, American National Standard for Information Systems - Data Encryption Algorithm - Modes of Operation, American National Standards Institute (Approved May 16, 1983)

    Google Scholar 

  15. Mitchell, C.J., et al.: Digital signature. In: Contemporary Cryptology, The Science of Information Integrity, pp. 325–378. IEEE Press, Los Alamitos (1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lim, JY. et al. (2003). Design of Security Enforcement Engine for Active Nodes in Active Networks. In: Kahng, HK. (eds) Information Networking. ICOIN 2003. Lecture Notes in Computer Science, vol 2662. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45235-5_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45235-5_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40827-7

  • Online ISBN: 978-3-540-45235-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics