Security issues in asynchronous transfer mode
This paper addresses the design and management of security services for ATM networks. Various options for the positioning of security services within the ATM protocol stack are discussed. After considering these possibilities, it is proposed to place the security layer between the AAL and ATM layers. The proposed security layer provides confidentiality, integrity and data origin authentication in the user plane. The developed security design can be transparently integrated into the B-ISDN Protocol Reference Model without in any way violating the existing standards.
KeywordsATM Security Security Services Security Layer for ATM
Unable to display preview. Download preview PDF.
- ATM Forum (1996) Phase 1 ATM security specification.Google Scholar
- Author Anonymity (1995) “A practical approach to the design and management of secure ATM networks”, In preparation, 1997.Google Scholar
- Author Anonymity “Secure Signalling and Authentication and Key Management for ATM Networks”, In Preparation, 1997.Google Scholar
- Chuang S.C. (1996) “Securing ATM networks”. Third ACM conference on computer and communication security, New Delhi, India.Google Scholar
- Deng R.H., Gong L. and Lazar A.A. (1995) “Securing data transfer in asynchronous transfer mode networks”. Proceedings of Globecomd 95, pp 1198–1202, Singapore.Google Scholar
- ITU-T Q.2931 (1995) B ISDN Application Protocols for Access Signaling.Google Scholar
- Laurent M., Paul O. and Rolin P. (1997) “Securing communications over ATM networks”. In Proceedings of IFIPSEC security Conference Copenhagen, Denmark.Google Scholar
- NIST Federal Information Processing Standards (FIPS) Publication (1993) Secure Hash Standard (Revised 1995).Google Scholar
- Stevenson D., Hillary N. and Byrd G. (1995) “Secure communications in ATM networks”. Vol 38, No. 2. Communications of the ACM.Google Scholar
- Voydock V. and Kent H. (1983) Security mechanisms in high level network protocols Google Scholar
- Weigelt, J. And Rahman, M. (1995) “Securing Asynchronous Transfer Mode Based networks Through the Use of Encryption”. In Proceedings of CCECE/CCGEI '95, pp 428–431.Google Scholar