Network Security Considerations for a New Generation Protocol UDT

被引:1
|
作者
Bernardo, Danilo Valeros [1 ]
Hoang, Doan [1 ]
机构
[1] Univ Technol Sydney, iNext Ctr Innovat IT Serv & Applicat, Fac Engn & Informat Technol, Sydney, NSW 2007, Australia
关键词
Next Generation Network Protocol; High Speed Bandwidth; Network Security Foundations;
D O I
10.1109/ICCSIT.2009.5234768
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper evaluates security issues of the recently designed and implemented next generation protocol UDTv4 and offers two contributions to this area of research. Firstly, since UDT is a relatively new protocol, its security requirements have not been considered and explored. An examination investigating its security requirements in implementation is performed. The objective is to achieve a wide class of security methods used on existing mature protocols such as TCP and UDP, and other developed variants such as DCCP and STCP. This will assist investigators, designers, and users who consider and incorporate security when implementing UDT. Secondly, it aims to provide ways of securing applications and traffic using UDT protocol as well as making recommendations for adequate methods to address its security requirements. This will highlight UDT's security limitations and determine the threshold of feasible security schemes within the constraints under which UDT was designed and developed.
引用
收藏
页码:125 / 130
页数:6
相关论文
共 50 条
  • [31] End-to-End Security Methods for UDT Data Transmissions
    Bernardo, Danilo Valeros
    Hoang, Doan B.
    FUTURE GENERATION INFORMATION TECHNOLOGY, 2010, 6485 : 383 - 393
  • [32] Optimization design of encryption protocol in network security protocol based on wireless network development
    Zhang, Ming
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (05) : 6099 - 6106
  • [33] Security modeling based on CSP for network protocol
    Xie, Xiaofei
    Li, Xiaohong
    Cao, Kunyu
    Feng, Zhiyong
    International Journal of Digital Content Technology and its Applications, 2012, 6 (01) : 496 - 504
  • [34] Test generation for network security rules
    Darmaillacq, Vianney
    Fernandez, Jean-Claude
    Groz, Roland
    Mounier, Laurent
    Richier, Jean-Luc
    TESTING OF COMMUNICATION SYSTEMS, PROCEEDINGS, 2006, 3964 : 341 - 356
  • [35] User independent protocol system for network security
    Luo, L
    Li, ZY
    Liu, YS
    2002 MILCOM PROCEEDINGS, VOLS 1 AND 2: GLOBAL INFORMATION GRID - ENABLING TRANSFORMATION THROUGH 21ST CENTURY COMMUNICATIONS, 2002, : 1130 - 1132
  • [36] Establishing the Security Foundations for Network Protocol Design
    Feng, Zebo
    Wu, Xiaoping
    Ma, Liangli
    Ren, Wei
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 789 - 793
  • [37] Network Protocol Security Testing Based on Fuzz
    Li Haifeng
    Wang Shaolei
    Zhang Bin
    Shuai Bo
    Tang Chaojing
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 955 - 958
  • [38] Study on Security of Next Generation Network
    Long Zhang
    Kai Zhao
    IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, : 538 - +
  • [39] Test generation for network security rules
    Laboratoire LSR-IMAG, BP 72, St Martin d’Hères
    38402, France
    不详
    38610, France
    Lect. Notes Comput. Sci., 2006, (341-356):
  • [40] A Snapshot Security Protocol for Radar Network Protection
    Mansouri, Houssem
    Pathan, Al-Sakib Khan
    Aliouat, Makhlouf
    2017 SEMINAR ON DETECTION SYSTEMS ARCHITECTURES AND TECHNOLOGIES (DAT), 2017,