The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January (2009 vol.20)
pp: 48-58
Chin-Fu Kuo , National University of Kaohsiung, Taipei
Ai-Chun Pang , National Taiwan University, Taipei
Sheng-Kun Chan , Chunghwa Telecom (CHT) Co., Ltd., Taiwan
ABSTRACT
Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, we aim at the proposing of a dynamic routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols, such as Routing Information Protocol in wired networks and Destination-Sequenced Distance Vector protocol in wireless networks, without introducing extra control messages. An analytic study on the proposed algorithm is presented, and a series of simulation experiments are conducted to verify the analytic results and to show the capability of the proposed algorithm.
INDEX TERMS
Data communications, Network-level security and protection, Distributed networks, Routing protocols
CITATION
Chin-Fu Kuo, Ai-Chun Pang, Sheng-Kun Chan, "Dynamic Routing with Security Considerations", IEEE Transactions on Parallel & Distributed Systems, vol.20, no. 1, pp. 48-58, January 2009, doi:10.1109/TPDS.2008.73
REFERENCES
[1] G. Apostolopoulos, V. Peris, P. Pradhan, and D. Saha, “Securing Electronic Commerce: Reducing the SSL Overhead,” IEEE Network, 2000.
[2] S. Bohacek, J.P. Hespanha, K. Obraczka, J. Lee, and C. Lim, “Enhancing Security via Stochastic Routing,” Proc. 11th Int'l Conf. Computer Comm. and Networks (ICCCN), 2002.
[3] D. Collins, Carrier Grade Voice over IP. McGraw-Hill, 2003.
[4] T.H. Cormen, C.E. Leiserson, and R.L. Rivest, Introduction to Algorithms. MIT Press, 1990.
[5] P. Erdös and A. Rényi, “On Random Graphs,” Publicationes Math. Debrecen, vol. 6, 1959.
[6] M. Faloutsos, P. Faloutsos, and C. Faloutsos, “On Power-Law Relationships of the Internet Topology,” Proc. ACM SIGCOMM '99, pp. 251-262, 1999.
[7] FreeS/WAN, http:/www.freeswan.org, 2008.
[8] I. Gojmerac, T. Ziegler, F. Ricciato, and P. Reichl, “Adaptive Multipath Routing for Dynamic Traffic Engineering,” Proc. IEEE Global Telecommunications Conf. (GLOBECOM), 2003.
[9] C. Hopps, Analysis of an Equal-Cost Multi-Path Algorithm, Request for comments (RFC 2992), Nov. 2000.
[10] C. Kaufman, R. Perlman, and M. Speciner, Network Security— PRIVATE Communication in a PUBLIC World, second ed. Prentice Hall PTR, 2002.
[11] J.F. Kurose and K.W. Ross, Computer Networking—A Top-Down Approach Featuring the Internet. Addison Wesley, 2003.
[12] V.I. Levenshtein, “Binary Codes Capable of Correcting Deletions, Insertions, and Reversals,” Soviet Physics Doklady, vol. 10, no. 8, pp. 707-710, 1966.
[13] S.-H. Liu, Y.-F. Lu, C.-F. Kuo, A.-C. Pang, and T.-W. Kuo, “The Performance Evaluation of a Dynamic Configuration Method over IPSEC,” Proc. 24th IEEE Real-Time Systems Symp.: Works in Progress Session (RTSS WIP), 2003.
[14] W. Lou and Y. Fang, “A Multipath Routing Approach for Secure Data Delivery,” Proc. IEEE Military Comm. Conf. (MilCom), 2001.
[15] W. Lou, W. Liu, and Y. Fang, “SPREAD: Improving Network Security by Multipath Routing,” Proc. IEEE Military Comm. Conf. (MilCom), 2003.
[16] G. Malkin, Routing Information Protocol (RIP) Version 2 Carrying Additional Information, Request for comments (RFC 1723), Nov. 1994.
[17] October 2004 Map Poster of the GEANT Topology, http://www.geant.net/upload/pdftopology_oct_2004.pdf , 2004.
[18] D.L. Mills, DCN Local-Network Protocols, Request for comments (RFC 891), Dec. 1983.
[19] J. Moy, Open Shortest Path First (OSPF) Version 2, Request for comments (RFC 1247), July 1991.
[20] C. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Proc. ACM SIGCOMM '94, pp. 234-244, 1994.
[21] Secure Sockets Layer (SSL), http:/www.openssl.org/, 2008.
[22] Cisco Systems, White Paper: EIGRP, Sept. 2002.
[23] R. Thayer, N. Doraswamy, and R. Glenn, IP Security Document Roadmap, Request for comments (RFC 2411), Nov. 1998.
[24] The Network Simulator-ns2, http://www.isi.edu/nsnamns/, 2008.
[25] J. Yang and S. Papavassiliou, “Improving Network Security by Multipath Traffic Dispersion,” Proc. IEEE Military Comm. Conf. (MilCom), 2001.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool