Minimizing the Number of Distrustful Nodes on the Path of IP Packet Transmission

Author:

Obelovska Kvitoslava1,Tkachuk Oleksandr1,Snaichuk Yaromyr1ORCID

Affiliation:

1. Department of Automated Control Systems, Lviv Polytechnic National University, 79013 Lviv, Ukraine

Abstract

One of the important directions for improving modern Wide Area Networks is efficient and secure packet routing. Efficient routing is often based on using the shortest paths, while ensuring security involves preventing the possibility of packet interception. The work is devoted to improving the security of data transmission in IP networks. A new approach is proposed to minimize the number of distrustful nodes on the path of IP packet transmission. By a distrustful node, we mean a node that works correctly in terms of hardware and software and fully implements its data transport functions, but from the point of view of its organizational subordination, we are not sure that the node will not violate security rules to prevent unauthorized access and interception of data. A distrustful node can be either a transit or an end node. To implement this approach, we modified Dijkstra’s shortest path tree construction algorithm. The modified algorithm ensures that we obtain a path that will pass only through trustful nodes, if such a path exists. If there is no such path, the path will have the minimum possible number of distrustful intermediate nodes. The number of intermediate nodes in the path was used as a metric to obtain the shortest path trees. Routing tables of routers, built on the basis of trees obtained using a modified algorithm, provide increased security of data transmission, minimizing the use of distrustful nodes.

Publisher

MDPI AG

Reference30 articles.

1. (2024, May 02). Understand Open Shortest Path (OSPF)—Design Guide, [Electronic Resource]. Available online: https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/7039-1.html.

2. Aweya, J. (2021). IP Routing Protocols: Fundamentals and Distance-Vector Routing Protocols, CRC Press. [1st ed.].

3. Medhi, D., and Ramasamy, K. (2018). Network Routing Algorithms, Protocols, and Architectures, A Volume in The Morgan Kaufmann Series in Networking, Morgan Kaufmann. [2nd ed.].

4. Performance analysis of OSPF and EIGRP convergence through IPsec tunnel using Multi-homing BGP connection;Basit;Mater. Today Proc.,2022

5. Improved Algorithm for the Packet Routing in Telecommunication Networks;Panchyshyn;Ukr. J. Inf. Technol.,2021

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3