Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines

被引:461
作者
Sterbenz, James P. G. [1 ,2 ]
Hutchison, David [2 ]
Cetinkaya, Egemen K. [1 ]
Jabbar, Abdul [1 ]
Rohrer, Justin P. [1 ]
Schoeller, Marcus [3 ]
Smith, Paul [2 ]
机构
[1] Univ Kansas, Lawrence, KS 66045 USA
[2] Univ Lancaster, Lancaster LA1 4YW, England
[3] NEC Labs Europe, Heidelberg, Germany
基金
美国国家科学基金会;
关键词
Communication network; Future Internet resilience; Fault tolerance; Survivability; Disruption tolerance; Dependability; Reliability; Availability; Security; Performability; Critical infrastructure; Defence; Defense; Detection; Remediation; Recovery; Restoration; Diagnosis; Refinement; Metrics; WIRELESS SENSOR NETWORKS; FRAMEWORK; DESIGN; SYSTEM;
D O I
10.1016/j.comnet.2010.03.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet has become essential to all aspects of modern life, and thus the consequences of network disruption have become increasingly severe. It is widely recognised that the Internet is not sufficiently resilient, survivable, and dependable, and that significant research, development, and engineering is necessary to improve the situation. This paper provides an architectural framework for resilience and survivability in communication networks and provides a survey of the disciplines that resilience encompasses, along with significant past failures of the network infrastructure. A resilience strategy is presented to defend against, detect, and remediate challenges, a set of principles for designing resilient networks is presented, and techniques are described to analyse network resilience. (C) 2010 Published by Elsevier B.V.
引用
收藏
页码:1245 / 1265
页数:21
相关论文
共 169 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
Alberts Christopher., 2003, Introduction to the OCTAVE Approach
[3]  
[Anonymous], 1997, CMUSEI97TR013
[4]  
[Anonymous], 1996, TELECOMMUNICATIONS G
[5]  
[Anonymous], P 28 IEEE C COMP COM
[6]  
[Anonymous], 2002, Proceedings of the 1st ACM workshop on Wireless security, DOI DOI 10.1145/570681.570685
[7]  
[Anonymous], P 2 CAN C COMP SCI S
[8]  
[Anonymous], SIGCOMM COMPUTER COM
[9]  
[Anonymous], P 6 ANN INT C MOB CO
[10]  
[Anonymous], MOBICOM 96