2009 Third International Conference on Network and System Security 2009
DOI: 10.1109/nss.2009.53
|View full text |Cite
|
Sign up to set email alerts
|

Grid of Security: A New Approach of the Network Security

Abstract: Network security is in a daily evolving domain. Every day, new attacks, virus or intrusion techniques are released. Hence, network devices, enterprise servers or personal computers are potential targets of these attacks. Current security solutions like firewalls, intrusion detection systems (IDS) and virtual private networks (VPN) are centralized solutions which rely mostly on the analyze of inbound network connections. This approach notably forgets the effects of a rogue station, whose communications cannot b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…A framework for public key infrastructure that focuses on wireless networks is proposed by Wuzheng [2]. An innovative method has been proposed by Flauzac namely grid of security [4]. It is distributed security solution in a balanced collective method.…”
Section: Backgrund Studymentioning
confidence: 99%
“…A framework for public key infrastructure that focuses on wireless networks is proposed by Wuzheng [2]. An innovative method has been proposed by Flauzac namely grid of security [4]. It is distributed security solution in a balanced collective method.…”
Section: Backgrund Studymentioning
confidence: 99%
“…In every domain SDNCH has its own security policies and management strategy to distribute routing functions and security rules to each border controller. We adopt this architecture to guarantee the security with the concept of a grid of security [27] embedded in each controller to prevent attacks. When a sensor node need to transmit the collected data to another domain, the flow has When a SDNCH fails, another controller can take control to avoid system failures [20], increasing trustworthiness and fault tolerance.…”
Section: Domain Interconnection In Sdcsnmentioning
confidence: 99%
“…If a cluster-head or the aggregator node is compromised by a malicious attacker, the data sent to the base station cannot be guaranteed. To solve potential problems concerning the security of clusterhead, we take into account the Grid of Security concept proposed by Flauzac et al in [27]. Previous studies [3], [7], [8], [9] in Software-Defined Networking implementations with wireless sensor nodes provide a better view of this paradigm.…”
Section: Introductionmentioning
confidence: 99%
“…Each SDN domain has its own security policies and management strategy. To solve potential problems raised by the heterogeneity of the security policies respective to the interconnected SDN domains, we use the Grid of Security concept proposed by Flauzac et al in 23 . The Grid of Security is a middleware for decentralized enforcement of the network security.…”
Section: Sdn Domain Interconnectionmentioning
confidence: 99%