DocumentCode :
3060038
Title :
On defining an hierarchical Secure proxy agent architecture for embedded communication network applications
Author :
Karras, D.A.
Author_Institution :
Dept. Autom., Chalkis Inst. of Technol., Chalkis, Greece
fYear :
2012
fDate :
20-22 Nov. 2012
Firstpage :
131
Lastpage :
134
Abstract :
The goal of this paper is to present the design and some implementation aspects of a security oriented proxy agent architecture to be used in embedded applications for network monitoring and remote control tasks. Whereas agents may be misused and lead to outflow of sensitive information on a network, they may also be exploited as a Security Enhancing Technology [1,2]. This paper presents the definition of such an architecture in the form of a fully configurable hierarchical and extensible filtering proxy for Secure Network Monitoring and control regarding a tactical wireless communication network. This approach allows the local network manager to freely specify and dynamically update his monitoring/control preferences/profile, without being limited by particular client-server implementations. It also becomes possible to implement high-level monitoring/control policies, where all technology-specific settings (such as enabling or disabling cookies, scripts, etc) are hidden in favor of more intuitive criteria such as the confidence levels that the local/global network manager is willing to grant to each network site. The proposed approach leads to a hierarchical management scheme with regards to the outlined proxy agent architecture.
Keywords :
client-server systems; computer network management; computer network security; filtering theory; mobile agents; monitoring; radiocommunication; telecommunication control; telecontrol; client-server implementations; configurable hierarchical filtering proxy; embedded communication network applications; extensible filtering proxy; global network manager; hierarchical management scheme; hierarchical secure proxy agent architecture; high-level control policy; high-level monitoring policy; local network manager; outlined proxy agent architecture; remote control; secure network monitoring; security enhancing technology; sensitive information; tactical wireless communication network; technology-specific settings; Computer architecture; Information filters; Mobile communication; Monitoring; Security; Embedded Systems. Tactical Communication Systems; Mobile Agents; Network Monitoring; Network Security Mechanisms; Proxy Agents;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Telecommunications Forum (TELFOR), 2012 20th
Conference_Location :
Belgrade
Print_ISBN :
978-1-4673-2983-5
Type :
conf
DOI :
10.1109/TELFOR.2012.6419165
Filename :
6419165
Link To Document :
بازگشت