Browse > Article
http://dx.doi.org/10.13089/JKIISC.2002.12.2.135

A Secure Active Packet Transfer using Cryptographic Techniques  

김영수 (한국전자통신연구원 네트워크보안연구부)
나중찬 (한국전자통신연구원 네트워크보안연구부)
손승원 (한국전자통신연구원 네트워크보안연구부)
Abstract
Active networks represent a new approach to network architecture. Nodes(routers, switches, etc.) can perform computations on user data, while packets can carry programs to be executed on nodes and potentially change the state of them. While active networks provide a flexible network iufrastructure, they are more complex than traditional networks and raise considerable security problems. Nodes are Public resources and are essential to the proper and contract running of many important systems. Therefore, security requirements placed upon the computational environment where the code of packets will be executed must be very strict. Trends of research for active network security are divided into two categories: securing active nodes and securing active packets. For example, packet authentication or monitoring/control methods are for securing active node, but some cryptographic techniques are for the latter. This paper is for transferring active packets securely between active nodes. We propose a new method that can transfer active packets to neighboring active nodes securely, and execute executable code included in those packets in each active node. We use both public key cryptosystem and symmetric key cryptosystem in our scheme
Keywords
능동 네트워크;능동 노드;능동 패킷;암호화 기술;
Citations & Related Records
연도 인용수 순위
  • Reference
1 /
[ L. Loeb ] / Secure Electronic Transactions: Introduction and Technical Reference
2 A survey of active network research /
[ D.L. Tennenhouse;J.M. Smith;W.D. Sincoskie;D.J. Wetherall;G.J. Minden ] / IEEE Communications Magazine   DOI   ScienceOn
3 Mobile Agents and Security /
[ M.S. Greenberg;J.C. Byington;D.G. Harper ] / IEEE Communications Magazine
4 /
[ B. Schwartz;A.W. Jackson;W.T. Strayer;W. Zhou;R.D. Rockwell;C. Partridge ] / Smart Packets for Active Networks
5 Efficient signature generation for smart cards /
[ C.P. Schnorr ] / Proc. of Crypto'89   DOI
6 Proof-Carrying Code /
[ G.C. Necula ] / Proc. Of 24th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
7 /
[ R.L. Rivest;A. Shamir;L. Adleman ] / A method for obtaining digital signatures and public key cryptosystems
8 Active networks: App. lications, Security, Safety, and Architectures /
[ K. Psounis ] / IEEE Communications Surveys
9 /
[ DARPA AN Security Working Group ] / Security Architecture for Active Nets
10 /
[ D. Alexander;B. Braden;C.A. Gunter;A.W. Jackson;A.D. Keromytis;G.J. Minden;D. Wetherall ] / Active Network Encapsulation Protocol, Draft
11 /
[ B. Schneier ] / App. lied Cryptography(Second Edition)
12 A Secure Method for Transferring Active Packets /
[ Y.S. Kim;J.C. Na;S.W. Sohn ] / Proc. of WSEAS'01
13 /
[ ANSI X9.17 (Revised) ] / American National Standard for financial Institution Key Management(Wholesale)
14 /
[ A.J. Menezes;P.C. Oorschot;S.A. Vanstone ] / Handbook of App. lied Cryptography
15 The MD5 Message Digest Algorithm /
[ R.L. Rivest ] / RFC 1321