Security issues in asynchronous transfer mode

  • Vijay Varadharajan
  • Rajan Shankaran
  • Michael Hitchens
Network Security
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1270)


This paper addresses the design and management of security services for ATM networks. Various options for the positioning of security services within the ATM protocol stack are discussed. After considering these possibilities, it is proposed to place the security layer between the AAL and ATM layers. The proposed security layer provides confidentiality, integrity and data origin authentication in the user plane. The developed security design can be transparently integrated into the B-ISDN Protocol Reference Model without in any way violating the existing standards.


ATM Security Security Services Security Layer for ATM 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    ATM Forum (1996) Phase 1 ATM security specification.Google Scholar
  2. [2]
    Author Anonymity (1995) “A practical approach to the design and management of secure ATM networks”, In preparation, 1997.Google Scholar
  3. [3]
    Author Anonymity “Secure Signalling and Authentication and Key Management for ATM Networks”, In Preparation, 1997.Google Scholar
  4. [4]
    Chuang S.C. (1996) “Securing ATM networks”. Third ACM conference on computer and communication security, New Delhi, India.Google Scholar
  5. [5]
    Deng R.H., Gong L. and Lazar A.A. (1995) “Securing data transfer in asynchronous transfer mode networks”. Proceedings of Globecomd 95, pp 1198–1202, Singapore.Google Scholar
  6. [6]
    ITU-T Q.2931 (1995) B ISDN Application Protocols for Access Signaling.Google Scholar
  7. [7]
    Laurent M., Paul O. and Rolin P. (1997) “Securing communications over ATM networks”. In Proceedings of IFIPSEC security Conference Copenhagen, Denmark.Google Scholar
  8. [8]
    NIST Federal Information Processing Standards (FIPS) Publication (1993) Secure Hash Standard (Revised 1995).Google Scholar
  9. [9]
    Stevenson D., Hillary N. and Byrd G. (1995) “Secure communications in ATM networks”. Vol 38, No. 2. Communications of the ACM.Google Scholar
  10. [10]
    Voydock V. and Kent H. (1983) Security mechanisms in high level network protocols Google Scholar
  11. [11]
    Weigelt, J. And Rahman, M. (1995) “Securing Asynchronous Transfer Mode Based networks Through the Use of Encryption”. In Proceedings of CCECE/CCGEI '95, pp 428–431.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1997

Authors and Affiliations

  • Vijay Varadharajan
    • 1
  • Rajan Shankaran
    • 1
  • Michael Hitchens
    • 2
  1. 1.Department of ComputingUniversity of Western Sydney NepeanKingswoodAustralia
  2. 2.Basser deaprtment of Computer ScienceUniversity of SydneyAustralia

Personalised recommendations