Security Issues in Asynchronous Transfer Mode

This paper addresses the design and management of security services for ATM networks. Various options for the positioning of security services within the ATM protocol stack are discussed. After considering these possibilities, it is proposed to place the security layer between the AAL and ATM layers. The proposed security layer provides confidentiality, integrity and data origin authentication in the user plane. The developed security design can be transparently integrated into the B-ISDN Protocol Reference Model without in any way violating the existing standards.

[1]  M. H. Rahman,et al.  Securing asynchronous transfer mode based networks through the use of encryption , 1995, Proceedings 1995 Canadian Conference on Electrical and Computer Engineering.

[2]  Gregory T. Byrd,et al.  Secure communications in ATM networks , 1995, CACM.

[3]  Shaw-Cheng Chuang,et al.  Securing ATM networks , 1996, CCS '96.

[4]  Maryline Laurent-Maknavicius,et al.  Securing communications over ATM networks , 1997, SEC.

[5]  Stephen T. Kent,et al.  Security Mechanisms in High-Level Network Protocols , 1983, CSUR.

[6]  Robert H. Deng,et al.  Securing data transfer in asynchronous transfer mode networks , 1995, Proceedings of GLOBECOM '95.