A Private Data Transfer Protocol Based On A New High Secure Computer Architecture

Focusing on the characteristics of the new high secure architecture of network computer, an operating system with internal network structure is designed. The operating system contains two subkernels: local kernel and network kernel, the two subkernels run individually in two subsystems. In order to communicate between two subsystems securely, an inter-subsystem private data transfer protocol is proposed and implemented in this paper. The private protocol is a connection-oriented protocol, it can provide reliable end-to-end connectivity Protocol format and protocol connection management based on signature verification are elaborated. Combining with shared transit cache which mounted on the shared bus, the private data transfer protocol can ensure data to be transferred safely and inerrably between subsystems. The effectiveness of the private data transfer protocol is verified by the results of final experiments.

[1]  Sudip Misra,et al.  Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing , 2008, Comput. Commun..

[2]  Donghui Guo,et al.  Security Analysis of Public-key Encryption Scheme Based on Neural Networks and Its Implementing , 2006, 2006 International Conference on Computational Intelligence and Security.

[3]  Sudip Misra,et al.  Message security in mobile ad-hoc networks: Using trust-based multi-path routing approach , 2007 .

[4]  Ben Rexworthy Network Intrusion: Intrusion detections systems - an outmoded network protection model , 2009 .

[5]  Bernd Klauer,et al.  List of Criteria for a Secure Computer Architecture , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.

[6]  John von Neumann,et al.  First draft of a report on the EDVAC , 1993, IEEE Annals of the History of Computing.

[7]  Sebastian Wallner,et al.  Secure communication in microcomputer bus systems for embedded devices , 2008, J. Syst. Archit..

[8]  Robert S. Ledley,et al.  Connputer - A Framework of Intrusion-Free Secure Computer Architecture , 2006, Security and Management.

[9]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[10]  Julien Bourgeois,et al.  A Global Security Architecture for Intrusion Detection on Computer Networks , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.

[11]  He Huang,et al.  A Hardware Implement of Bus Bridge Based on Single CPU and Dual Bus Architecture , 2008, 2008 International Symposium on Computer Science and Computational Technology.

[12]  Julien Bourgeois,et al.  A global security architecture for intrusion detection on computer networks , 2008, Comput. Secur..

[13]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.