Network Security Considerations for a New Generation Protocol UDT

被引:1
|
作者
Bernardo, Danilo Valeros [1 ]
Hoang, Doan [1 ]
机构
[1] Univ Technol Sydney, iNext Ctr Innovat IT Serv & Applicat, Fac Engn & Informat Technol, Sydney, NSW 2007, Australia
关键词
Next Generation Network Protocol; High Speed Bandwidth; Network Security Foundations;
D O I
10.1109/ICCSIT.2009.5234768
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper evaluates security issues of the recently designed and implemented next generation protocol UDTv4 and offers two contributions to this area of research. Firstly, since UDT is a relatively new protocol, its security requirements have not been considered and explored. An examination investigating its security requirements in implementation is performed. The objective is to achieve a wide class of security methods used on existing mature protocols such as TCP and UDP, and other developed variants such as DCCP and STCP. This will assist investigators, designers, and users who consider and incorporate security when implementing UDT. Secondly, it aims to provide ways of securing applications and traffic using UDT protocol as well as making recommendations for adequate methods to address its security requirements. This will highlight UDT's security limitations and determine the threshold of feasible security schemes within the constraints under which UDT was designed and developed.
引用
收藏
页码:125 / 130
页数:6
相关论文
共 50 条
  • [1] A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT
    Bernardo, Danilo Valeros
    Hoang, Doan B.
    SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 367 - 371
  • [2] Formalization and Information-Theoretic Soundness in the Development of Security Architecture for Next Generation Network Protocol - UDT
    Bernardo, Danilo V.
    Hoang, Doan B.
    SECURITY TECHNOLOGY, 2011, 259 : 183 - 194
  • [3] A Security Framework and its Implementation in Fast Data Transfer Next Generation Protocol UDT
    Bernardo, Danilo Valeros
    Hoang, Doan
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 354 - 360
  • [4] A New Adaptative Security Protocol for UAV Network
    Zouhri, Oumhany
    Benhadou, Siham
    Medromi, Hicham
    ADVANCES IN UBIQUITOUS NETWORKING 2, 2017, 397 : 649 - 657
  • [5] Security Considerations for the WirelessHART Protocol
    Raza, Shahid
    Slabbert, Adriaan
    Voigt, Thiemo
    Landernas, Krister
    2009 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (EFTA 2009), 2009,
  • [6] A New Access Protocol for Elevating the Security of IJTAG Network
    Kumar, Gaurav
    Riaz, Anjum
    Prasad, Yamuna
    Ahlawat, Satyadev
    2022 IEEE 31ST ASIAN TEST SYMPOSIUM (ATS 2022), 2022, : 31 - 36
  • [7] Device Authentication/Authorization Protocol for Home Network in Next Generation Security
    Moon, Jong Sik
    Lee, Deok Gyu
    Lee, Im-Yeong
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 760 - +
  • [8] A Security Test Message Generation Algorithm of Diameter Protocol in the IMS Network
    Sun, Zhibo
    Xing, Wenhui
    Cui, Xiaoyan
    2015 2ND INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING AND INTERNET OF THINGS (DCIT), 2015, : 72 - 79
  • [9] Security Considerations in OpenTag Network
    Farhadi, Hamid
    Furuhashi, Ryoji
    Nakao, Akihiro
    2014 26TH INTERNATIONAL TELETRAFFIC CONGRESS (ITC), 2014,
  • [10] Spatial representation of the effect of new generation on network security
    Grijalva, S
    Visnesky, AM
    2004 IEEE PES POWER SYSTEMS CONFERENCE & EXPOSITION, VOLS 1 - 3, 2004, : 144 - 149