Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A secure active network environment architecture: realization in SwitchWare

Published: 01 May 1998 Publication History

Abstract

An active network is a network infrastructure which is programmable on a per-user or even per-packet basis. Increasing the flexibility of such network infrastructures invites new security risks. Coping with these security risks represents the most fundamental contribution of active network research. The security concerns can be divided into those which affect the network as a whole and those which affect individual elements. It is clear that the element problems must be solved first, since the integrity of network-level solutions will be based on trust in the network elements. In this article we describe the architecture and implementation of a secure active network environment (SANE), which we believe provides a basis for implementing secure network-level solutions. We guarantee that a node begins operation in a trusted state with the AEGIS secure bootstrap architecture. We guarantee that the system remains in a trusted state by applying dynamic integrity checks in the network element's runtime system, using a novel naming system, and applying node-to-node authentication when needed. The construction of an extended LAN is discussed

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Network: The Magazine of Global Internetworking
IEEE Network: The Magazine of Global Internetworking  Volume 12, Issue 3
May 1998
64 pages

Publisher

IEEE Press

Publication History

Published: 01 May 1998

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2014)The road to SDNACM SIGCOMM Computer Communication Review10.1145/2602204.260221944:2(87-98)Online publication date: 8-Apr-2014
  • (2013)The Road to SDNQueue10.1145/2559899.256032711:12(20-40)Online publication date: 8-Dec-2013
  • (2012)Research on security management in active network node operating systemsProceedings of the 2012 international conference on Web Information Systems and Mining10.1007/978-3-642-33469-6_35(254-263)Online publication date: 26-Oct-2012
  • (2009)Supporting communities in programmable grid networksProceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management10.5555/1688933.1688996(406-413)Online publication date: 1-Jun-2009
  • (2008)Securing user-controlled routing infrastructuresIEEE/ACM Transactions on Networking10.1109/TNET.2007.90398016:3(549-561)Online publication date: 1-Jun-2008
  • (2007)Decentralized enforcement of security policies for distributed computational systemsProceedings of the 2007 ACM symposium on Applied computing10.1145/1244002.1244064(241-248)Online publication date: 11-Mar-2007
  • (2006)Towards content trust of web resourcesProceedings of the 15th international conference on World Wide Web10.1145/1135777.1135861(565-574)Online publication date: 23-May-2006
  • (2005)Multimedia data transmission and control using active networksComputer Communications10.1016/j.comcom.2004.08.02028:6(623-639)Online publication date: 1-Apr-2005
  • (2005)Future active Ip networks security architectureComputer Communications10.1016/j.comcom.2004.08.01228:6(688-701)Online publication date: 1-Apr-2005
  • (2003)Reasoning about secrecy for active networksJournal of Computer Security10.5555/859246.85925111:2(245-287)Online publication date: 1-Mar-2003
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media