Font Size: a A A

The Research And Implementation Of A Trusted Router

Posted on:2012-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y K MaoFull Text:PDF
GTID:2178330335460781Subject:Information security
Abstract/Summary:PDF Full Text Request
With the popularization and explosive growth of the Internet, the problems of network congestion and Internet trust crisis have become more and more serious. But the developing technologies of congestion avoidance such as QoS and the network security products-centered thread protection systems are not qualified to meet these two big challenges. So after fully research of the deep reasons of these problems and the principles of routers and the ideas of trust-management, this paper presents the design and implementation of the trusted router, which with trust-management infrastructure generates routing tables and forwards IP packets with different precedencies according to trust-values. Through those trusted routers, a trusted routing architecture is outlined which can punish wrongdoers and motivate the right. And at last, simulations results and the measurement data of real trusted AS network are provided to verify that this trusted routing architecture and trusted router can lay the solid foundation for network congestion and network trust crisis to some extent.
Keywords/Search Tags:Congestion Control, Trust, Security, Router
PDF Full Text Request
Related items