Title :
Secure signaling and access control for ATM networks
Author :
Shankaran, Rajan ; Varadharajan, Vijay
Author_Institution :
Sch. of Comput., Univ. of Western Sydney, Kingswood, NSW, Australia
Abstract :
Asynchronous transfer mode (ATM) is seen to be a technology that allows flexibility, efficiency and manageable bandwidth on demand to be achieved in high-speed networks. ATM is able to support a variety of applications, including voice, video, image and data, with different quality-of-service (QoS) requirements. This paper addresses the design of security services in ATM networks. It considers the placement of a security layer between the ATM adaptation layer (AAL) and the ATM layer that provides confidentiality, integrity and data origin authentication in the user plane. The paper then considers secure signaling and describes a public key-based authentication and key management protocol that can be integrated as part of secure call setup. This protocol is part of an overall public key infrastructure framework for ATM networks. Finally, the paper discusses the issues involved in the provision of an access control service at the connection setup phase and the user data transfer phase
Keywords :
access protocols; asynchronous transfer mode; authorisation; data integrity; data privacy; message authentication; public key cryptography; telecommunication signalling; ATM adaptation layer; ATM networks; access control service; asynchronous transfer mode; confidentiality; connection setup phase; data integrity; data origin authentication; efficiency; flexibility; high-speed networks; key management protocol; manageable bandwidth; public key infrastructure framework; public key-based authentication; secure call setup; secure signaling; security layer; security services; service quality; user data transfer phase; Access control; Access protocols; Asynchronous transfer mode; Authentication; Bandwidth; Data security; High-speed networks; Quality of service; Technology management; Video on demand;
Conference_Titel :
Computer Security Applications Conference, 1998. Proceedings. 14th Annual
Conference_Location :
Phoenix, AZ
Print_ISBN :
0-8186-8789-4
DOI :
10.1109/CSAC.1998.738622