Abstract
This paper addresses the design and management of security services for ATM networks. Various options for the positioning of security services within the ATM protocol stack are discussed. After considering these possibilities, it is proposed to place the security layer between the AAL and ATM layers. The proposed security layer provides confidentiality, integrity and data origin authentication in the user plane. The developed security design can be transparently integrated into the B-ISDN Protocol Reference Model without in any way violating the existing standards.
Preview
Unable to display preview. Download preview PDF.
References
ATM Forum (1996) Phase 1 ATM security specification.
Author Anonymity (1995) “A practical approach to the design and management of secure ATM networks”, In preparation, 1997.
Author Anonymity “Secure Signalling and Authentication and Key Management for ATM Networks”, In Preparation, 1997.
Chuang S.C. (1996) “Securing ATM networks”. Third ACM conference on computer and communication security, New Delhi, India.
Deng R.H., Gong L. and Lazar A.A. (1995) “Securing data transfer in asynchronous transfer mode networks”. Proceedings of Globecomd 95, pp 1198–1202, Singapore.
ITU-T Q.2931 (1995) B ISDN Application Protocols for Access Signaling.
Laurent M., Paul O. and Rolin P. (1997) “Securing communications over ATM networks”. In Proceedings of IFIPSEC security Conference Copenhagen, Denmark.
NIST Federal Information Processing Standards (FIPS) Publication (1993) Secure Hash Standard (Revised 1995).
Stevenson D., Hillary N. and Byrd G. (1995) “Secure communications in ATM networks”. Vol 38, No. 2. Communications of the ACM.
Voydock V. and Kent H. (1983) Security mechanisms in high level network protocols
Weigelt, J. And Rahman, M. (1995) “Securing Asynchronous Transfer Mode Based networks Through the Use of Encryption”. In Proceedings of CCECE/CCGEI '95, pp 428–431.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Varadharajan, V., Shankaran, R., Hitchens, M. (1997). Security issues in asynchronous transfer mode. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027945
Download citation
DOI: https://doi.org/10.1007/BFb0027945
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63232-0
Online ISBN: 978-3-540-69237-9
eBook Packages: Springer Book Archive