Network Security Considerations for a New Generation Protocol UDT

被引:1
|
作者
Bernardo, Danilo Valeros [1 ]
Hoang, Doan [1 ]
机构
[1] Univ Technol Sydney, iNext Ctr Innovat IT Serv & Applicat, Fac Engn & Informat Technol, Sydney, NSW 2007, Australia
关键词
Next Generation Network Protocol; High Speed Bandwidth; Network Security Foundations;
D O I
10.1109/ICCSIT.2009.5234768
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper evaluates security issues of the recently designed and implemented next generation protocol UDTv4 and offers two contributions to this area of research. Firstly, since UDT is a relatively new protocol, its security requirements have not been considered and explored. An examination investigating its security requirements in implementation is performed. The objective is to achieve a wide class of security methods used on existing mature protocols such as TCP and UDP, and other developed variants such as DCCP and STCP. This will assist investigators, designers, and users who consider and incorporate security when implementing UDT. Secondly, it aims to provide ways of securing applications and traffic using UDT protocol as well as making recommendations for adequate methods to address its security requirements. This will highlight UDT's security limitations and determine the threshold of feasible security schemes within the constraints under which UDT was designed and developed.
引用
收藏
页码:125 / 130
页数:6
相关论文
共 50 条
  • [41] Automatic Generation of Network Protocol Gateways
    Bromberg, Yerom-David
    Reveillere, Laurent
    Lawal, Julia L.
    Muller, Gilles
    MIDDLEWARE 2009, PROCEEDINGS, 2009, 5896 : 21 - +
  • [42] New Security Protocol for digital Surveillance
    不详
    INFORMATION-WISSENSCHAFT UND PRAXIS, 2023, 74 (5-6): : 334 - 334
  • [43] Security personnel of new generation
    Ljubymenko, Krystyna
    Adamek, Milan
    2018 52ND ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2018, : 192 - 195
  • [44] A New Generation of Security Solutions
    Kilpatrick, Ian
    Database and Network Journal, 2003, 33 (05):
  • [45] Network resilience for transport security: Some methodological considerations
    Reggiani, Aura
    TRANSPORT POLICY, 2013, 28 : 63 - 68
  • [46] Security enhancement of a novel proxy key generation protocol
    Tsai, Chiung-Chou
    Lia, Kuan-Chieh
    Chen, Tzung-Her
    Lee, Wei-Bin
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 681 - +
  • [47] Grid of security: a new approach of the network security
    Flauzac, Olivier
    Nolot, Florent
    Rabat, Cyril
    Steffenel, Luiz-Angelo
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 67 - 72
  • [48] Network Access Security for the Internet: Protocol for Carrying Authentication for Network Access
    Marin-Lopez, Rafa
    Pereniguez-Garcia, Fernando
    Gomez-Skarmeta, Antonio F.
    Ohba, Yoshihiro
    IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (03) : 84 - 92
  • [49] Improvement on an optimized protocol for mobile network authentication and security
    Chang, CC
    Lee, JS
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 538 - 541
  • [50] Security Enhancement of AODVjr Routing Protocol for ZigBee Network
    Shang, Tao
    Liu, Jianwei
    2010 5TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2010,