ACTIVE NETWORK SECURITY BASED RSA ALGORITHM

محتوى المقالة الرئيسي

Ahmed Freidoon Fadhil
Wisam haitham abbood

الملخص

The difficulty of building a secure network is due to the changing nature of the enterprise coupled with the increasing sophistication of the hacker threat, both from inside and outside of the network. Active networks enable individual user or groups of users to inject customized programs into the nodes of the network.
The proposed system depends on the basic concepts (authentication and authorization) and uses RSA algorithm to add additional level of security. The proposed system also depends on active packet architecture, the packet will represented in the active node as input, and when the packet is retransmitted to another active node it carries information about each node it visits. The result of execution the packet will display in the first node where the packet started.

تفاصيل المقالة

القسم

Articles

كيفية الاقتباس

"ACTIVE NETWORK SECURITY BASED RSA ALGORITHM" (2009) مجلة الهندسة, 15(04), ص 4163–4175. doi:10.31026/j.eng.2009.04.05.

المراجع

 Bhattacharjee S., “Active Networks: Architectures, Composition and Applications”, a PhD Thesis, Georgia Institute of Technology, 1999.

 Calvert K. L., “Architecture Framework for Active Networks”, a PhD Thesis, Georgia Institute of Technology, 1999.

 Eva H., and Ludek K.,”Active networks and high speed content delivery”, Proceedings of the The 7th International Conference of European University Information Systems on The Changing Universities - The Role of Technology, Vol. 13, PP. 448-456, 2001.

 Gert D. L., and Gert S., "Network Security Fundamentals", Cisco System, Inc. published by: Cisco press, 2005.

 http:// www.ciscopress.com/bookstore/product.asp?isbn=1587051672

 Jean-Patrick G., "Towards the design of an active network architecture supporting throughputs of gigabit networks", a PhD Thesis, University of Tennessee, December 2003.

 Laat C. de, Gross G., Gommans L., Vollbrecht J., and Spence D., "Generic AAA Architecture", IETF Network Working Group, Internet experimental RFC 2903, August 2000.

http://tools.ietf.org/html/rfc2903

 Ravi S. and Pierangela S., "Authentication, Access Control, and Audit", ACM Computing Surveys, Vol. 28, No. 1, March 1996.

 Psounis K., "Active Networks: Applications, Security, Safety and Architectures", IEEE Communications Surveys and Tutorials, Vol. 2, No. 1, PP. 2-16, First Quarter 1999.

 Tennenhouse D. L., Sincoskie W. D., and Wetherall D. J., “A Survey of Active Network Research", IEEE Communication Magazine, Vol. 35, No. 1, PP. 80-86, January 1997.  Tennenhouse D. L., and Wetherall D. J., “Towards an Active Network Architecture”, DARPA Active Networks Conference and Exposition, San Francisco, CA, USA. IEEE Computer Society 2002, PP. 29-31 , May 2002.

 Wetherall D. J., "Active network vision and reality: lessons from a capsule-based system", 17th ACM Symposium on Operating Systems Principles (SOSP ’99) Published as Operating Systems Review Vol. 34, No. 5, PP. 64–79, Dec. 1999 .

المؤلفات المشابهة

يمكنك أيضاً إبدأ بحثاً متقدماً عن المشابهات لهذا المؤلَّف.

الأعمال الأكثر قراءة لنفس المؤلف/المؤلفين