Secure authentication and access control in ATM networks

被引:0
|
作者
Varadharajan, V [1 ]
Shankaran, R [1 ]
Hitchens, M [1 ]
机构
[1] Univ Western Sydney Nepean, Sch Comp & Informat Technol, Distributed Syst & Network Secur Res Unit, Kingswood, NSW 2747, Australia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Asynchronous Transfer Mode (ATM) is seen to be a technology that allows flexibility, efficiency mid manageable bandwidth on demand to be achieved in high speed networks. ATM is able to support a variety of applications including voice, video, image and data with different quality of service requirements. This paper addresses the design and implementation of security services it, ATM networks. The paper proposes the placement of security layer between the AAL and the ATM layer providing security services such as confidentiality, integrity and data origin authentication services in the user plane. The paper then presents an authentication scheme and key establishment protocol. This protocol is integrated with the existing ATM signalling protocols as part of the call setup procedures in the control plane. Finally the paper considers the design of access control service for ATM networks and discusses the issues involved iii the provision of access control mechanisms both at connection setup phase mid the user data transfer phase.
引用
收藏
页码:69 / 77
页数:9
相关论文
共 50 条
  • [1] Secure signaling and access control for ATM networks
    Shankaran, R
    Varadharajan, V
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 212 - 222
  • [2] Secure data aggregation using access control and authentication for wireless sensor networks
    Razaque, Abdul
    Rizvi, Syed S.
    COMPUTERS & SECURITY, 2017, 70 : 532 - 545
  • [3] Strong Authentication for Secure Content Access in Converged Networks
    Nallusamy, Rajarathnam
    Paul, Sanjoy
    2009 IEEE 3RD INTERNATIONAL SYMPOSIUM ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (ANTS 2009), 2009, : 91 - 93
  • [4] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing
    Pawar, Prativesh
    Sheikh, Rashid
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [5] Combined Web/mobile authentication for secure Web access control
    Al-Qayedi, A
    Adi, W
    Zahro, A
    Mabrouk, A
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 677 - 681
  • [6] Access control and authentication for converged wireless networks
    Fu, Zhi Judy
    Strassner, John C.
    2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, : 289 - +
  • [7] Access control and authentication for converged wireless networks
    Fu, Zhi
    Strassner, John C.
    2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, : 300 - +
  • [8] Secure Multifactor Remote Access User Authentication Framework for IoT Networks
    Alshahrani, Mohammed Mujib
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (03): : 3235 - 3254
  • [9] Design of Secure Access Authentication Scheme for Distributed Terminals in Distribution Networks
    Duo C.
    Yang T.
    Zhang M.
    Li B.
    Li Y.
    Wang G.
    Dianwang Jishu/Power System Technology, 2023, 47 (11): : 4778 - 4789
  • [10] Medium access control for wireless extensions of ATM networks
    Meierhofer, J
    Bernhard, UP
    IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 29 - 33