New Security Layer for OverLay Networks

被引:0
|
作者
Imai, Hideki [1 ,2 ]
Shin, SeongHan [1 ,2 ]
Kobara, Kazukuni [1 ,2 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, RCIS, Chiyoda Ku, Tokyo 1010021, Japan
[2] Chuo Univ, Bunkyo Ku, Tokyo 1128551, Japan
关键词
Availability; leakage-resilience; network storage; AUTHENTICATED KEY EXCHANGE; RSA; SIGNATURES; PROTOCOL;
D O I
10.1109/JCN.2009.6391326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
After clarifying the underlying problems in a secure network storage, we introduce two important requirements, leakage-resilience and availability in higher levels respectively, for data keys that are used to protect remotely-stored data. As a main contribution of this paper, we give a new security layer for overlay networks by proposing a leakage-resilient authentication and data management system. In this system, we specifically propose a single mode and a cluster mode where the latter provides a higher level of both leakage-resilience and availability for the data key.
引用
收藏
页码:211 / 228
页数:18
相关论文
共 50 条
  • [1] Physical Layer Security in Overlay Cognitive Radio Networks With Energy Harvesting
    Li, Mu
    Yin, Hao
    Huang, Yuzhen
    Wang, Yan
    Yu, Rui
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (11) : 11274 - 11279
  • [2] A Session Layer Concept for Overlay Networks
    Tom Mahieu
    Pierre Verbaeten
    Wouter Joosen
    Wireless Personal Communications, 2005, 35 : 111 - 121
  • [3] An overlay MAC layer for 802.11 networks
    Rao, A
    Stoica, I
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES (MOBISYS 2005), 2005, : 135 - 148
  • [4] A session layer concept for overlay networks
    Mahieu, T
    Verbaeten, P
    Joosen, W
    WIRELESS PERSONAL COMMUNICATIONS, 2005, 35 (1-2) : 111 - 121
  • [5] Network layer support for overlay networks
    Jannotti, J
    2002 IEEE OPEN ARCHITECTURES AND NETWORK PROGRAMMING PROCEEDINGS, 2002, : 3 - 13
  • [6] A New Model for Physical Layer Security in Cellular Networks
    Geraci, Giovanni
    Dhillon, Harpreet S.
    Andrews, Jeffrey G.
    Yuan, Jinhong
    Collings, Iain B.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 2147 - 2152
  • [7] Multi-layer Monitoring of Overlay Networks
    Demirci, Mehmet
    Lo, Samantha
    Seetharaman, Srini
    Ammar, Mostafa
    PASSIVE AND ACTIVE NETWORK MEASUREMENT, PROCEEDINGS, 2009, 5448 : 77 - +
  • [8] A Security Framework for Service Overlay Networks: Access Control
    Kurian, Jinu
    Sarac, Kamil
    2008 5TH INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATIONS, NETWORKS AND SYSTEMS (BROADNETS 2008), 2008, : 412 - 419
  • [9] Overlay Networks with Jamming and Energy Harvesting: Security Analysis
    Khuong Ho-Van
    Thiem Do-Dac
    Arabian Journal for Science and Engineering, 2021, 46 : 9713 - 9724
  • [10] Overlay Networks with Jamming and Energy Harvesting: Security Analysis
    Ho-Van, Khuong
    Do-Dac, Thiem
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (10) : 9713 - 9724