742,976 research outputs found

    Performance analysis of a security architecture for active networks in Java

    Get PDF
    Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network operation. Active networks are composed of special nodes (named Active Router) that are able to execute active code to offer the active services. This technology introduces some security threats that must be solved using a security architecture. We have developed a security architecture (ROSA) for an active network platform (SARA). Java has been used as programming language in order to provide portability, but it imposes some performance limitations. This paper analyses the penalty of using Java and proposes some mechanisms to improve the performance of cryptographic implementations in Java.Publicad

    Mobility through Heterogeneous Networks in a 4G Environment

    Get PDF
    Serving and Managing users in a heterogeneous environment. 17th WWRF Meeting in Heidelberg, Germany, 15 - 17 November 2006. [Proceeding presented at WG3 - Co-operative and Ad-hoc Networks]The increase will of ubiquitous access of the users to the requested services points towards the integration of heterogeneous networks. In this sense, a user shall be able to access its services through different access technologies, such as WLAN, Wimax, UMTS and DVB technologies, from the same or different network operators, and to seamless move between different networks with active communications. In this paper we propose a mobility architecture able to support this users’ ubiquitous access and seamless movement, while simultaneously bringing a large flexibility to access network operators

    Adaptive management of an active services network

    Get PDF
    The benefits of active services and networks cannot be realised unless the associated increase in system complexity can be efficiently managed. An adaptive management solution is required. Simulation results show that a distributed genetic algorithm, inspired by observations of bacterial communities, can offer many key management functions. The algorithm is fast and efficient, even when the demand for network services is rapidly varying

    Service Allocation in a Mobile Fog Infrastructure under Availability and QoS Constraints

    Full text link
    The next generation of mobile networks, namely 5G, and the Internet of Things (IoT) have brought a large number of delay sensitive services. In this context Cloud services are migrating to the edge of the networks to reduce latency. The notion of Fog computing, where the edge plays an active role in the execution of services, comes to meet the need for the stringent requirements. Thus, it becomes of a high importance to elegantly formulate and optimize this problem of mapping demand to supply. This work does exactly that, taking into account two key aspects of a service allocation problem in the Fog, namely modeling cost of executing a given set of services, and the randomness of resources availability, which may come from pre-existing load or server mobility. We introduce an integer optimization formulation to minimize the total cost under a guarantee of service execution despite the uncertainty of resources availability.Comment: 5 pages, 5 figure

    Multidomain Network Based on Programmable Networks: Security Architecture

    Get PDF
    This paper proposes a generic security architecture designed for a multidomain and multiservice network based on programmable networks. The multiservice network allows users of an IP network to run programmable services using programmable nodes located in the architecture of the network. The programmable nodes execute codes to process active packets, which can carry user data and control information. The multiservice network model defined here considers the more pragmatic trends in programmable networks. In this scenario, new security risks that do not appear in traditional IP networks become visible. These new risks are as a result of the execution of code in the programmable nodes and the processing of the active packets. The proposed security architecture is based on symmetric cryptography in the critical process, combined with an efficient manner of distributing the symmetric keys. Another important contribution has been to scale the security architecture to a multidomain scenario in a single and efficient way.Publicad

    Principios y Aplicaciones de las Redes Activas

    Get PDF
    This paper presents an overview of a new network technology: active networks. The active networks goal is to produce a new networking platform, flexible and extensible at runtime to accommodate the rapid evolution and deployment of networking technologies and also to provide the increasingly sophisticated services demanded by users. A snapshot of the architecture being developed in DARPA active networks program is presented. Finally, potential applications of active networks are highlighted, along with some of the challenges that must be overcome to make them a reality
    corecore