Securing the residential asynchronous transfer mode networks
In this paper, we consider the security management of a residential ATM network, the ATM Warren. Threats within the ATM Warren are presented and counter-measures to some of these threats are suggested. Security issues in the ATM Warren such as protection domain, naming, firewalling and delegation are also discussed. We also propose user authentication mechanism based on infra-red remote control. Finally, we demonstrate an efficient data path protection mechanism that is able to handle dumb ATM end devices.
KeywordsData Path Asynchronous Transfer Mode Proxy Signalling Message Authentication Code Asynchronous Transfer Mode Network
Unable to display preview. Download preview PDF.
- 1.Cheswick W. and Bellovin S.: Firewall and Internet Security: Repelling the Wily Hacker. Addison-Wesley, Reading, Mass. 1994Google Scholar
- 3.Chuang S. C.: Securing ATM Networks. University of Cambridge Computer Laboratory, Technical Report 384. July 1995Google Scholar
- 4.Chuang S. C.: Securing ATM Networks. Proceedings of the 3nd ACM Conference on Computer and Communications Security. March 1996. 19–30Google Scholar
- 5.Greaves D. J.: Residential ATM Common Aspects. ATM Forum Contribution 95-0214, HREF='http://www.cl.cam.ac.uk/users/djg/residential-baseline.txt. 1995Google Scholar
- 6.Haller N.: The S/KEY One-Time Password System. RFC1760. February 1995Google Scholar
- 7.Lomas T.M.A.: Collision-Freedom, Considered Harmful, or How to Boot a Computer. Proceeding 1995 Japan-Korea Joint Workshop on Information Security and Cryptology. January 1995Google Scholar
- 8.Tennenhouse D.: Layered Multiplexing Considered Harmful. IFIP WG6.1/6.4 Workshop: Protocols for High Speed Networks, IBM Zurich Research Lab. Ed. Harry Rubin and Robin Williamson. May 1989Google Scholar