Abstract
The Broadband Integrated Services Digital Network (B-ISDN) is expected to be the public communications network of the future. One of the prime factors influencing the development of such a network is the emergence of a large number of teleservices with different requirements (sometimes still unknown). However, a common requirement for all these services is the need to be protected against unauthorised use, which can be achieved through a suitable security system.
Although specific security mechanisms can be developed for each application and service on the network, we consider that an integrated solution providing security services for all types of multimedia applications is more efficient. Therefore, we study the integration of the different security services in the network architecture, comparing different possibilities and proposing an integrated solution where bulk encryption is placed on top of the ATM Adaptation Layer (AAL).
Chapter PDF
References
CCITT Recommendation 1.121. (1991) Broadband Aspects of ISDN.
CCITT Recommendation 1.321. (1991) B-ISDN Protocol Reference Model and its Applications.
Cruselles, E. et al. (1995) Secure Communications in Broadband Networks. Proceedings of the 3rd. International Conference on Telecommunication Systems. Nashville, TE. March 1995. pp. 114–122.
Gula de la, D. et al. (1994) ASIC_CRIPTO: un Circuito Integrado para el Modulo de Seguridad del PLANBA. Proceedings III Reunion Espanola sobre Criptologia. Barcelona (Spain). December 1994. pp. 14–26. (in Spanish).
Forné J., et al. (1995) The CRIPTO Project Architecture: A Spanish Experience in Broadband Networks Security. Proceedings of the ICC’95. Seattle, WA. June 1995.
Macq, B. M. and Quisquater, J. J. (1995) Cryptology for digital TV broadcasting, Proc. of the IEEE, vol. 83, no. 6, pp. 944–957.
Martinez del Cerro, F. J., Fernández-Amigo Barranco, J. (1993) “Servicios multimedia: TEMA/PLANBA”. Comunicaciones de Telefonica Ii-D. Vol. 4, N° 2, (in Spanish).
Recacha, F. et al. (1993) Secure Communications in Extended Ethernet Environments. IEEE Journal on Selected Areas in Communications. Volume 11. Number 5.
Rueppel, R. A.,(1986) Analysis and Design of Stream Ciphers. Springer-Verlag.
Shannon, C. E. (1949) Communication theory of secret systems, Bell Syst. Tech J., vol. 28, no. 4, pp. 656–715.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Forné, J., Melûs, J.L. (1996). An integrated solution for secure communications over B-ISDN. In: Horster, P. (eds) Communications and Multimedia Security II. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35083-7_9
Download citation
DOI: https://doi.org/10.1007/978-0-387-35083-7_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2931-2
Online ISBN: 978-0-387-35083-7
eBook Packages: Springer Book Archive