Skip to main content

A Novel Secure Routing System in Overlay Environment

  • Conference paper
Grid and Cooperative Computing - GCC 2005 (GCC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 3795))

Included in the following conference series:

  • 457 Accesses

Abstract

Routers are effective building blocks for Internet. It is almost impossible to modify router software only for applications. How to satisfy applications’ specific requirements of communication is a big problem. Now more and more systems begin to place application oriented routing service on overlay networks. This paper compares several overlay routing systems based on route number and brings forward a novel routing system based on trust model. System design principles are discussed and system simulation performance is analyzed. The results show that the system is able to provide secure routing service to applications in the case of vicious nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sherry, S., Meyer, G.: RFC2092: Protocol Analysis for Triggered RIP (January 1997), http://rfc2092.x42.com

  2. Rekhter, Y., Li, T.: A Border Gateway Protocol 4 (BGP-4), RFC 1771 (March 1995), http://www.scit.wlv.ac.uk/rfc/rfc17xx/RFC1771.html

  3. Akella, A., Pang, J.: A Comparison of Overlay Routing and Multi homing Route Control. In: Proc. ACM SIGCOMM 2004 Conference, Taormina, Sicily, Italy (2004)

    Google Scholar 

  4. Andersen, D., Snoeren, A.: Best-Path vs. Multi-Path Overlay Routing. In: Proc. ACM SIGCOMM Internet Measurement Conference, Miami, FL (October 2003)

    Google Scholar 

  5. Andersen, D., Balakrishnan, H., Kaashoek, M.: Resilient Overlay Networks. In: Proc. 18th ACM SOSP, Banff, Canada, October 2001, pp. 131–145 (2001)

    Google Scholar 

  6. Snoeren, A., Conley, K., Gifford, D.: Mesh Based Content Routing Using XML. In: Proc. 18th ACM SOSP, Banff, Canada, October 2001, pp. 160–173 (2001)

    Google Scholar 

  7. Zhao, B., Huang, L., Joseph, A.: Exploiting Routing Redundancy Using a Wide-area Overlay. Technical Report UCB/CSD 2002.12 (November 2002), http://www.cs.ucsb.edu/~ravenben/tapestry/html/fault.html

  8. Zhu, D., Gritter, M.: Feedback Based Routing. In: Proc. ACM HotNet-I Workshop 2002, Princeton, NJ, USA, October 2002, pp. 71–76 (2002)

    Google Scholar 

  9. Ersin, U., Mark, R.: A Reputation-Based Trust Management System for P2P Networks. In: ACM International Conference on Information and Knowledge Management, Atlanta, pp. 65–73 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Su, H., Wang, Y. (2005). A Novel Secure Routing System in Overlay Environment. In: Zhuge, H., Fox, G.C. (eds) Grid and Cooperative Computing - GCC 2005. GCC 2005. Lecture Notes in Computer Science, vol 3795. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11590354_17

Download citation

  • DOI: https://doi.org/10.1007/11590354_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30510-1

  • Online ISBN: 978-3-540-32277-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics