Implementation of Diameter Protocol for securing Network Elements in back-haul network

被引:0
|
作者
Jha, Divya [1 ]
Shahi, Bimlendu [1 ]
机构
[1] Jain Univ, Sch Engn & Technol, Embedded Syst Design, Bangalore, Karnataka, India
关键词
Back-haul network; Network Elements(NEs); Diameter; AAA; security; topology hiding;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
There has been a continuous growth in volume of data in the back-haul network. In future, there will be much more signaling complexity in the network. Provisioning of security to signal storms in such a complex network is a critical issue. There can be several attacks such as replay attack, which can compromise the security of signals in the network as well as the Network Elements (NEs) providing crucial functions and applications. Diameter, which is AAA protocol, can be applied to the Network Elements deployed in the back-haul network to secure Network Elements themselves as well as to guarantee that the data provided to the subscribers to the applications provided by Network Elements is protected against security attacks. This paper presents an implementation of Diameter protocol in GNS3 Simulator using UNIX platform. It supports topology hiding and controls unauthorized access of NEs, thus providing security to NEs in the back-haul network.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Implementation for Securing the Cloud Data and Providing Secured Access Across the Network
    Sheshasaayee, Ananthi
    Geetha, K.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 1, 2017, 468 : 783 - 790
  • [22] A New Network Access Control Method Based on Diameter Protocol
    Gu, Li-chuan
    Li, Shao-wen
    Cheng, Zhu
    Zhang, You-hua
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 600 - 604
  • [23] Securing Multipath Routing protocol using Authentication approach for Wireless Sensor Network
    Gulhane, Gaurav
    Mahajan, Nikita V.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 729 - 733
  • [24] Implementation of a Stateful Network Protocol Intrusion Detection Systems
    Seng, S.
    Garcia-Alfaro, J.
    Laarouci, Y.
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 398 - 405
  • [25] A declarative implementation of the DICOM-3 network protocol
    Kalet, IJ
    Giansiracusa, RS
    Jacky, J
    Avitan, D
    JOURNAL OF BIOMEDICAL INFORMATICS, 2003, 36 (03) : 159 - 176
  • [26] Design and Implementation of Security Protocol for Home-Network
    Lee, Young-Gu
    Kim, Jung-Jae
    Kim, Hyun-Chul
    Jun, Moon-Seog
    SNPD 2009: 10TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCES, NETWORKING AND PARALLEL DISTRIBUTED COMPUTING, PROCEEDINGS, 2009, : 220 - 224
  • [27] A multiple access protocol implementation for a virtual cellular network
    Bakker, JD
    Prasad, R
    1999 IEEE 49TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-3: MOVING INTO A NEW MILLENIUM, 1999, : 1707 - 1711
  • [28] Multiple access protocol implementation for a virtual cellular network
    Bakker, J.D.
    Prasad, R.
    IEEE Vehicular Technology Conference, 1999, 2 : 1707 - 1711
  • [29] Implementation of Internet Protocol Multimedia Subsystem for Femtocell Network
    Oh, Yong Il
    Kim, Jin Young
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 387 - 390
  • [30] Implementation of Virtual Private Network based on IPSec Protocol
    Wu, Jianwu
    2009 ETP INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (FCC 2009), 2009, : 138 - 141