The full text of this article
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
by Jerzy Konorski; Piotr Pacyna; Grzegorz Kolaczek; Zbigniew Kotulski; Krzysztof Cabaj; Pawel Szalachowski
International Journal of Trust Management in Computing and Communications (IJTMCC), Vol. 1, No. 3/4, 2013
Abstract: An EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project's Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation or forging. It is argued that the measures to be taken differ in nature from those ensuring classical security attributes. A combination of hard- and soft-security mechanisms produces node reputation and trust metrics, which permits to eliminate or ostracise misbehaving nodes. Experiments carried out in a small-scale IIPS testbed are briefly discussed.
Online publication date: Mon, 16-Sep-2013
is only available to individual subscribers or to users at subscribing institutions.
Go to Inderscience Online Journals to access the Full Text of this article.
Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.
Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Trust Management in Computing and Communications (IJTMCC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable).
See our Orders page to subscribe.
If you still need assistance, please email email@example.com