Title :
A Thin Security Layer Protocol over IP Protocol on TCP/IP Suite for Security Enhancement
Author :
Al-Jarrah, Mohammad ; Tamimi, Abdel-Karim R.
Author_Institution :
Dept. of Comput. Eng., Yarmouk Univ., Irbid
Abstract :
In this paper, we proposed a security enhancement for TCP/IP suite. This enhancement adds three modules to TCP/IP. These are security policy, security control, and data security layer. Unlike IPsec, which plugs all security enforcements into IP layer, the proposed architecture distributes the proposed module into their relevant layer. The security policy belongs to application layer, and the security control and management located in the transport layer. The data security layer is located between the transport layer and the IP layer. Security policy interacts with system administrator to define the policies and roles of security to be applied in data communication. Security control module provides the means to apply the security policy defined in security policy module and establishes a secure channel, it uses four-way handshaking and public key cryptography (PKC) to create virtual secure connection and security entity (SE). SE holds the secret key cryptography (SKC), addresses of two hosts that share this SKC, and other vital information necessary to carry out a secure data communication. For data security, we proposed a thin security protocol (TSP) over IP protocol. TSP protocol encrypts and encapsulates the coming transport layer packet into TSP packets. The TSP packet header consists only of two fields each of them is one bytes. The first field identifies the TSP packet types such as public key request, public key acknowledgement (ACK), and secret key and secret key ACK, The second field carries information about the transport layer protocol. In TSP design and implementation, our concern was to minimize the overhead added to IP including traffic volume and transmission delay. In term of data size, TSP adds only two bytes as TSP header
Keywords :
Internet; data encapsulation; private key cryptography; public key cryptography; telecommunication channels; transport protocols; IP protocol; Internet security; TCP/IP; channel security; data communication; data security layer; four-way handshaking; packet encapsulation; packet encryption; public key acknowledgement; public key cryptography; secret key cryptography; security entity; thin security protocol; transport layer; Communication system control; Communication system security; Cryptographic protocols; Data communication; Data security; Information security; Public key; Public key cryptography; TCPIP; Transport protocols; Encryption; internet security; secure channel; secure protocol;
Conference_Titel :
Innovations in Information Technology, 2006
Conference_Location :
Dubai
Print_ISBN :
1-4244-0674-9
Electronic_ISBN :
1-4244-0674-9
DOI :
10.1109/INNOVATIONS.2006.301920