Abstract
The problem of secure information transmission over networks in distributed systems is considered. It is shown that protective measures that are used in such systems only on the network layer are insufficient. Analysis of the data packets transmitted between the system components has shown that, in the systems with high requirements for information security, the application-level security protocols should be used. It is shown that the maximum independence of security protocols from the remaining data-transmission protocols should be provided.
Similar content being viewed by others
References
N. Ferguson and B. Schneier, Practical Cryptography (Wiley, New York, 2003; Vil’yams, Moscow, 2005).
R. T. Braden, Requirements for Internet Hosts—Communication Layers (RFC 1122) (Inform. Sci. Inst., Marina del Rey, 1989).
ISO/IES 7498-1:1994. Information Processing Systems. Open Systems Interconnection. Basic Reference Model: The Basic Model (ISO, 1994).
T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.1 (RFC 4346) (Internet Engineering Task Force, Sterling, 2006).
S. Kent and R. Atkinson, Security Architecture for the Internet Protocol (RFC 2401) (Internet Engineering Task Force, Sterling, 1998)
A. V. Galitskii, S. D. Ryabko, and V. F. Shan’gin, Data Security in the Net. Analysis of Technologies and Synthesis of Solutions (DMK, Moscow, 2004) [in Russian].
Additional information
Original Russian Text © A.V. Novoselov, V.E. Antsiperov, S.A. Nikitov, 2007, published in Radiotekhnika i Elektronika, 2007, Vol. 52, No. 10, pp. 1228–1231.
Rights and permissions
About this article
Cite this article
Novoselov, A.V., Antsiperov, V.E. & Nikitov, S.A. Information protection in distributed systems with the help of different layer protocols. J. Commun. Technol. Electron. 52, 1133–1136 (2007). https://doi.org/10.1134/S1064226907100099
Received:
Issue Date:
DOI: https://doi.org/10.1134/S1064226907100099