Research on Architecture Survivability of Wireless Networks

Article Preview

Abstract:

In this paper, the network architecture of wireless network systems survivability, the ideas based on intrusion tolerance, redundancy and diversity of technology will be combined, using threshold cryptography, presents a viable network server security architecture. This proposal implements key features of the system security and robustness, the database system to meet the survivability requirements for building a wireless network server architecture has important reference value.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 834-836)

Pages:

1081-1086

Citation:

Online since:

October 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] E. H. Spafford, D. Zamboni. Intrusion detection using autonomous Agents, Computer Networks, 34(4): 547-570, (2000).

DOI: 10.1016/s1389-1286(00)00136-5

Google Scholar

[2] V. Gorodetski, I. Kotenko. Sixteenth Annual Working Conference on In-formation Security, Beijing, China, pp.291-300, (2000).

Google Scholar

[3] A. G. Pennington, J. D. Strunk, etc. Storage-based Intrusion Detection: Watching storage activity for spicious behavior. Proceeding of the 12th USENIX Security Symposium. Washington, D.C. (2003).

Google Scholar

[4] P. Liu, S. Jajodia. Multi-phase dam-age con_nement in database systems for intrusion tolerance. In Proc. 14th IEEE Computer Security Foundations Workshop, pp.191-205, (2001).

DOI: 10.1109/csfw.2001.930146

Google Scholar

[5] P. Liu, P. Luenam. ODAM: An on-the-fly samage assessment and repair sys-tem for commercial database applica-tions. In Proc. 15th IFIP WG 11. 3 Working Conference on Database and application Security.

Google Scholar