Skip to main content

Security issues in asynchronous transfer mode

  • Network Security
  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1270))

Included in the following conference series:

Abstract

This paper addresses the design and management of security services for ATM networks. Various options for the positioning of security services within the ATM protocol stack are discussed. After considering these possibilities, it is proposed to place the security layer between the AAL and ATM layers. The proposed security layer provides confidentiality, integrity and data origin authentication in the user plane. The developed security design can be transparently integrated into the B-ISDN Protocol Reference Model without in any way violating the existing standards.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ATM Forum (1996) Phase 1 ATM security specification.

    Google Scholar 

  2. Author Anonymity (1995) “A practical approach to the design and management of secure ATM networks”, In preparation, 1997.

    Google Scholar 

  3. Author Anonymity “Secure Signalling and Authentication and Key Management for ATM Networks”, In Preparation, 1997.

    Google Scholar 

  4. Chuang S.C. (1996) “Securing ATM networks”. Third ACM conference on computer and communication security, New Delhi, India.

    Google Scholar 

  5. Deng R.H., Gong L. and Lazar A.A. (1995) “Securing data transfer in asynchronous transfer mode networks”. Proceedings of Globecomd 95, pp 1198–1202, Singapore.

    Google Scholar 

  6. ITU-T Q.2931 (1995) B ISDN Application Protocols for Access Signaling.

    Google Scholar 

  7. Laurent M., Paul O. and Rolin P. (1997) “Securing communications over ATM networks”. In Proceedings of IFIPSEC security Conference Copenhagen, Denmark.

    Google Scholar 

  8. NIST Federal Information Processing Standards (FIPS) Publication (1993) Secure Hash Standard (Revised 1995).

    Google Scholar 

  9. Stevenson D., Hillary N. and Byrd G. (1995) “Secure communications in ATM networks”. Vol 38, No. 2. Communications of the ACM.

    Google Scholar 

  10. Voydock V. and Kent H. (1983) Security mechanisms in high level network protocols

    Google Scholar 

  11. Weigelt, J. And Rahman, M. (1995) “Securing Asynchronous Transfer Mode Based networks Through the Use of Encryption”. In Proceedings of CCECE/CCGEI '95, pp 428–431.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vijay Varadharajan Josef Pieprzyk Yi Mu

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Varadharajan, V., Shankaran, R., Hitchens, M. (1997). Security issues in asynchronous transfer mode. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027945

Download citation

  • DOI: https://doi.org/10.1007/BFb0027945

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63232-0

  • Online ISBN: 978-3-540-69237-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics