The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The central security concern for systems where agents roam is how to establish trust in the agent. We present a Fuzzy Logic mechanism to calculate a level of trust and an optimal route for a mobile agent system in a smart home. The mechanism consists of two parts. The first path calculates a trust level at the platform side to decide which actions should be allowed to a visiting mobile agent. The...
While transparent optical networks become more and more popular as the basis of the next generation Internet (NGI) infrastructure, such networks raise many security issues, which do not exist in traditional optoelectronic networks. The existing protection schemes which rely heavily on fault detection with the use of network monitoring performed by optoelectronic conversion at the switching nodes,...
The following topics are dealt with: interconnection networks; distributed processing; parallel processing; multi-core architectures; distributed systems; intelligent systems; ubiquitous systems; middleware; ubiquitous networking; wireless sensor networks; mobile ad hoc networks; security; service computing; routing; Internet; Web technology; medical document processing; intelligent medical information...
From the aspect of inter-domain routing security, it is important to identify the critical ASes which transmit a large fraction of data traffic. By analyzing the BGP routing process under the control of routing polices and evaluating a series of Transmit factors, we realize that BGP routing system has a Hinge-Transmit property. It indicates that Tier-1 AS set is the hinge of the Internet, transmitting...
Traditional Internet faces many challenges, ranging from security threats, routing scaling problems to inadequate support for mobility, multihoming and traffic engineering. This paper proposes a clean-state network-based architecture, named identifier separating and mapping architecture (ISMA), to solve these problems. The key design concepts of ISMA include separating customer networks from the core...
Path splicing is a proposed routing architecture for the Internet in which end-hosts could change the path their traffic uses by changing a number of bits in the packet header. Path splicing improves the reliability of the network against link failures since it ensures that physically connected links can be discovered and used. To that end, this paper studies the performance of path splicing in non-adversarial...
Router has acted as more and more important role in the large-scale network. In the meantime, the security of the router become more seriously. In this paper, we propose a new algorithm to decide a credential routing path from the start router to the end one based on the trust theory that considers the trustworthy of link, the cost of link and the trustworthy of router as the critical factors so as...
Many researchers working on concepts for the next generation Internet agree that the split of identifier and locator seems to be a very promising approach. Although this solution addresses the most critical issues in today's internet, new challenges arise through the mapping between locator and identifier. Our proposal takes a look at novel DHT-based mapping concepts and points out the trust problem...
Inter-domain routing system is the critical infrastructure of Internet. Make sure that autonomous system (AS) announces and prefers authentic routing information is very important to the security of inter-domain routing system. Due to BGP's opaqueness and AS's autonomy, it is difficult for AS to identify whether an incoming BGP route is valid. We design a reputation mechanism based on Bayesian probability...
Currently, Internet, adopting the TCP/IP suits, is an end-to-end architecture. TCP/IP is an open architecture, and its design principle only focuses on the efficiency of information transmission, while it does not consider the security issues. IPsec VPN has been proposed to solve the core network security issue. However, it is believed that the current use of IP addresses to denote both the location...
Similar to the customer / service provider network model that exists in the Internet today, the Department of Defense's (DoD's) Global Information Grid (GIG) will consist of various customer networks (Army, Navy, etc.) that interconnect over a common core. Customer networks will source and sink IP traffic, and a transit network(s) will provide connectivity between geographically disparate customer...
Site multi-homing is an important capability in modern military networks. Resilience of a site is greatly enhanced when it has multiple upstream connections to the global information grid, including the global Internet. Similarly, the ability to provide traffic engineering for a site can be important in reducing delays and packet loss over low-bandwidth and/or high-delay uplinks. Current approaches...
Security is assuming increasing importance in emerging networks. To ensure application security, the routing protocols are assumed to be trusted. Correct forwarding of packets requires the prior exchange of information among routers, using the appropriate routing protocol. Valid construction of the routes requires that the exchanged information be received from a legitimate neighbor, and that it not...
In order to ensure ubiquitous connectivity, networks have to operate in regions with very limited infrastructure support. There has been intense recent research activity in the emerging areas of intermittently connected, ad hoc, and delay/disruption tolerant networks (DTN). DTNs differ greatly, depending on the nature of the network environment; they range from deep space networks to buses driving...
The current closed network infrastructure creates a gap between industry and academy. This paper discusses a framework of a completely open network infrastructure, including open routing devices and open operation of those devices. By such an open network, academia researchers and industry practitioners can jointly work on the network design, optimization and innovation, which provide another dimension...
Border Gateway Protocol (BGP) is the de-facto routing protocol in the Internet. Unfortunately, it is not a secure protocol, and as a result, several attacks have been successfully mounted against the Internet infrastructure. Among the security requirements of BGP is the ability to validate the actual source and path of the BGP update message. This is needed to help reduce the threat of prefix hijacking...
The security of inter-domain routing system greatly depends on the trustworthiness of routing information and routing behavior of autonomous system (AS). Many researches on e-commerce, grid, and p2p have proven that reputation mechanism is helpful to inhibit the spread of false route and the occurrence of malicious routing behavior. To increase AS resistance to malicious routing attack, we designs...
The Internet is migrating from IPv4 to IPv6. To determine the features for research test bed product selection, we compare the up-to-date information of IPv4 and IPv6. Currently IPv6 network penetration is still low but it is expected to grow, while IPv4 address pool is projected by Regional Internet Registry to be exhausted by the end of 2011. The reason why uptake of IPv6 is still low is because...
The current implementation of BGP protocol has a variety of vulnerabilities and weakness. Monitoring BGPpsilas behavior is an effective way to improve the security of inter-domain routing. Due to the difficulty of obtaining routing tables from autonomous systems, a packet-based model for detecting routing anomalies is presented. This model contains data collectors, anomaly detection engine, routing...
Name Services for the Internet of Things (specifically, the EPCglobal Network) are distributed systems that serve the following fundamental lookup function: Given an identifier for a real-world object, e.g., an Electronic Product Code (EPC), they return a list of Internet addresses of services, which offer additional information about this object. Without name services acting as a broker between items...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.