Commenced in January 2007
Paper Count: 30184
Domain-based Key Management Scheme for Active Network
Abstract:Active network was developed to solve the problem of the current sharing-based network–difficulty in applying new technology, service or standard, and duplicated operation at several protocol layers. Active network can transport the packet loaded with the executable codes, which enables to change the state of the network node. However, if the network node is placed in the sharing-based network, security and safety issues should be resolved. To satisfy this requirement, various security aspects are required such as authentication, authorization, confidentiality and integrity. Among these security components, the core factor is the encryption key. As a result, this study is designed to propose the scheme that manages the encryption key, which is used to provide security of the comprehensive active directory, based on the domain.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1078899Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1208
 David L.Tennehouse, et al., "A Survey of Active Network Research", IEEE Com. 1997.
 David L. Tennenhouse and David J. Wetherall, "Towards an Active Network Architecture", Comp. Commun. Rev. vol 26, no 2, Apr. 1996.
 AN Security Working Group, "Security Architecture for Active Nets", Jul. 1998, Modified by Seraphim Group, May 2000.
 Roy H. Campbell, et al., "Seraphim: Dynamic Interoperable Security Architecture for Active Networks", IEEE OPENARCH 2000.
 K. Psounis, "Active Networks: Applications, Security, Safety, and Architectures", IEEE Communication Surveys, 1999.
 J.M. Park, K.J. Chae, "Active Network Security Technology Trend", Sigcomm Review, Dec. 2000.
 Y.S. Kim, J.C. Na, S.W. Sohn, "A Secure Method for Transferring Active Packets", Proc. of WSEAS'01, Cairns, Australia, Dec.17-21. 2001.