Advertisement

Securing the residential asynchronous transfer mode networks

  • Shaw-Cheng Chuang
  • David Greaves
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1189)

Abstract

In this paper, we consider the security management of a residential ATM network, the ATM Warren. Threats within the ATM Warren are presented and counter-measures to some of these threats are suggested. Security issues in the ATM Warren such as protection domain, naming, firewalling and delegation are also discussed. We also propose user authentication mechanism based on infra-red remote control. Finally, we demonstrate an efficient data path protection mechanism that is able to handle dumb ATM end devices.

Keywords

Data Path Asynchronous Transfer Mode Proxy Signalling Message Authentication Code Asynchronous Transfer Mode Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Cheswick W. and Bellovin S.: Firewall and Internet Security: Repelling the Wily Hacker. Addison-Wesley, Reading, Mass. 1994Google Scholar
  2. 2.
    Hayter M. D. and McAuley D. R.: The Desk Area Network. ACM Operating Systems Review, v.25, n.4, pp.14–21, October 1991CrossRefGoogle Scholar
  3. 3.
    Chuang S. C.: Securing ATM Networks. University of Cambridge Computer Laboratory, Technical Report 384. July 1995Google Scholar
  4. 4.
    Chuang S. C.: Securing ATM Networks. Proceedings of the 3nd ACM Conference on Computer and Communications Security. March 1996. 19–30Google Scholar
  5. 5.
    Greaves D. J.: Residential ATM Common Aspects. ATM Forum Contribution 95-0214, HREF='http://www.cl.cam.ac.uk/users/djg/residential-baseline.txt. 1995Google Scholar
  6. 6.
    Haller N.: The S/KEY One-Time Password System. RFC1760. February 1995Google Scholar
  7. 7.
    Lomas T.M.A.: Collision-Freedom, Considered Harmful, or How to Boot a Computer. Proceeding 1995 Japan-Korea Joint Workshop on Information Security and Cryptology. January 1995Google Scholar
  8. 8.
    Tennenhouse D.: Layered Multiplexing Considered Harmful. IFIP WG6.1/6.4 Workshop: Protocols for High Speed Networks, IBM Zurich Research Lab. Ed. Harry Rubin and Robin Williamson. May 1989Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1997

Authors and Affiliations

  • Shaw-Cheng Chuang
    • 1
  • David Greaves
    • 1
  1. 1.Computer LaboratoryUniversity of CambridgeCambridgeUK

Personalised recommendations