Domain-based Key Management Scheme for Active Network
Active network was developed to solve the problem of
the current sharing-based network–difficulty in applying new
technology, service or standard, and duplicated operation at several
protocol layers. Active network can transport the packet loaded with
the executable codes, which enables to change the state of the network
node. However, if the network node is placed in the sharing-based
network, security and safety issues should be resolved. To satisfy this
requirement, various security aspects are required such as
authentication, authorization, confidentiality and integrity. Among
these security components, the core factor is the encryption key. As a
result, this study is designed to propose the scheme that manages the
encryption key, which is used to provide security of the
comprehensive active directory, based on the domain.
[1] David L.Tennehouse, et al., "A Survey of Active Network Research", IEEE
Com. 1997.
[2] David L. Tennenhouse and David J. Wetherall, "Towards an Active
Network Architecture", Comp. Commun. Rev. vol 26, no 2, Apr. 1996.
[3] AN Security Working Group, "Security Architecture for Active Nets", Jul.
1998, Modified by Seraphim Group, May 2000.
[4] Roy H. Campbell, et al., "Seraphim: Dynamic Interoperable Security
Architecture for Active Networks", IEEE OPENARCH 2000.
[5] K. Psounis, "Active Networks: Applications, Security, Safety, and
Architectures", IEEE Communication Surveys, 1999.
[6] J.M. Park, K.J. Chae, "Active Network Security Technology Trend",
Sigcomm Review, Dec. 2000.
[7] Y.S. Kim, J.C. Na, S.W. Sohn, "A Secure Method for Transferring Active
Packets", Proc. of WSEAS'01, Cairns, Australia, Dec.17-21. 2001.
[1] David L.Tennehouse, et al., "A Survey of Active Network Research", IEEE
Com. 1997.
[2] David L. Tennenhouse and David J. Wetherall, "Towards an Active
Network Architecture", Comp. Commun. Rev. vol 26, no 2, Apr. 1996.
[3] AN Security Working Group, "Security Architecture for Active Nets", Jul.
1998, Modified by Seraphim Group, May 2000.
[4] Roy H. Campbell, et al., "Seraphim: Dynamic Interoperable Security
Architecture for Active Networks", IEEE OPENARCH 2000.
[5] K. Psounis, "Active Networks: Applications, Security, Safety, and
Architectures", IEEE Communication Surveys, 1999.
[6] J.M. Park, K.J. Chae, "Active Network Security Technology Trend",
Sigcomm Review, Dec. 2000.
[7] Y.S. Kim, J.C. Na, S.W. Sohn, "A Secure Method for Transferring Active
Packets", Proc. of WSEAS'01, Cairns, Australia, Dec.17-21. 2001.
@article{"International Journal of Information, Control and Computer Sciences:61311", author = "Jong-Whoi Shin and Soon-Tai Park and Chong-Sun Hwang", title = "Domain-based Key Management Scheme for Active Network", abstract = "Active network was developed to solve the problem of
the current sharing-based network–difficulty in applying new
technology, service or standard, and duplicated operation at several
protocol layers. Active network can transport the packet loaded with
the executable codes, which enables to change the state of the network
node. However, if the network node is placed in the sharing-based
network, security and safety issues should be resolved. To satisfy this
requirement, various security aspects are required such as
authentication, authorization, confidentiality and integrity. Among
these security components, the core factor is the encryption key. As a
result, this study is designed to propose the scheme that manages the
encryption key, which is used to provide security of the
comprehensive active directory, based on the domain.", keywords = "Active Network, Domain-based Key Management,Security Components.", volume = "2", number = "2", pages = "558-4", }