The Design and Implementation of Secure Socket SCTP

被引:0
|
作者
Lindskog, Stefan [1 ]
Brunstrom, Anna [2 ]
机构
[1] Norwegian Univ Sci & Technol, Ctr Quantifiable Qual, Serv Commun Syst, N-7034 Trondheim, Norway
[2] Karlstad Univ, Dept Comp Sci, karlstad, Sweden
来源
关键词
SCTP; end-to-end security; protocol design; implementation; packet protection; security differentiation; message complexity; TRANSPORT;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes the design and implementation of secure socket SCTP ((SSCTP)-S-2). (SSCTP)-S-2 is a new multi-layer, end-to-end security solution for SCTP. It uses the AUTH protocol extension of SCTP for integrity protection of both control and user messages; TLS is the proposed solution for authentication and key agreement; Data confidentiality is provided through encryption and decryption at the socket library layer. (SSCTP)-S-2 is designed to offer as much security differentiation support as possible using standardized solutions and mechanisms. En the paper, (SSCTP)-S-2 is also compared to SCTP over IPsec and TLS over SCTP in terms of packet protection, security differentiation, and message complexity. The following main conclusions can be draw from the comparison. (SSCTP)-S-2 compares favorably in terms of offered security differentiation and message overhead. Confidentiality protection of SCTP control information is, however, only offered by SCTP over IPsec.
引用
收藏
页码:180 / +
页数:4
相关论文
共 50 条
  • [31] Design and implementation of a chaotic secure communication system
    Chou, Hsi-Chiang
    Chou, Chuan-Wei
    Hsu, Wei-Hung
    2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 1117 - 1121
  • [32] Design and Implementation of a Secure Social Network System
    Layfield, Ryan
    Thuraisingham, Bhavani
    Khan, Latifur
    Kantarcioglu, Murat
    Rachapalli, Jyothsna
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 236 - 247
  • [33] Design and Implementation of a Secure RFID System on FPGA
    Ozen, Okan Emre
    Ors, S. Berna
    Yagci, H. Bulent
    2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2013,
  • [34] Techniques for Design and Implementation of Secure Reconfigurable PUFs
    Majzoobi, Mehrdad
    Koushanfar, Farinaz
    Potkonjak, Miodrag
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2009, 2 (01)
  • [35] A Secure Healthcare System: From Design to Implementation
    Cankaya, Ebru Celikel
    Kywe, Than
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND SOFTWARE ENGINEERING (SCSE'15), 2015, 62 : 203 - 212
  • [36] Design and implementation of a secure social network system
    Layfield, Ryan
    Thuraisingham, Bhavani
    Khan, Laatifur
    Kantarcioglu, Murat
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2009, 24 (02): : 71 - 83
  • [37] Design and implementation of secure SMS messaging system
    Yu, D. (zjydg@163.com), 1600, Advanced Institute of Convergence Information Technology, Myoungbo Bldg 3F,, Bumin-dong 1-ga, Seo-gu, Busan, 602-816, Korea, Republic of (04):
  • [38] The Design and Implementation of Secure Cloud Desktop System
    Pan, Huifang
    Yuan, Yi
    Song, Wenlong
    An, Zhou
    SIGNAL AND INFORMATION PROCESSING, NETWORKING AND COMPUTERS (ICSINC), 2019, 550 : 212 - 218
  • [39] Design and implementation of secure medical database systems
    Pangalos, GJ
    MEDICAL INFORMATICS, 1995, 20 (03): : 265 - 277
  • [40] The design and implementation of a multilevel secure log manager
    Pesati, VR
    Keefe, TF
    Pal, S
    1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 55 - 64