Implementation of Diameter Protocol for securing Network Elements in back-haul network

被引:0
|
作者
Jha, Divya [1 ]
Shahi, Bimlendu [1 ]
机构
[1] Jain Univ, Sch Engn & Technol, Embedded Syst Design, Bangalore, Karnataka, India
关键词
Back-haul network; Network Elements(NEs); Diameter; AAA; security; topology hiding;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
There has been a continuous growth in volume of data in the back-haul network. In future, there will be much more signaling complexity in the network. Provisioning of security to signal storms in such a complex network is a critical issue. There can be several attacks such as replay attack, which can compromise the security of signals in the network as well as the Network Elements (NEs) providing crucial functions and applications. Diameter, which is AAA protocol, can be applied to the Network Elements deployed in the back-haul network to secure Network Elements themselves as well as to guarantee that the data provided to the subscribers to the applications provided by Network Elements is protected against security attacks. This paper presents an implementation of Diameter protocol in GNS3 Simulator using UNIX platform. It supports topology hiding and controls unauthorized access of NEs, thus providing security to NEs in the back-haul network.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A WEB APPLIANCE IMPLEMENTATION: REDUCING AND SECURING NETWORK TRAFFIC IN A VIRTUAL LABORATORY ENVIRONMENT
    Gomes, Joao Quental
    Carvalho, Tiago
    Faisca, Jose
    Rogado, Jose Quintino
    3RD INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION (ICERI2010), 2010, : 6456 - 6465
  • [32] A Security Test Message Generation Algorithm of Diameter Protocol in the IMS Network
    Sun, Zhibo
    Xing, Wenhui
    Cui, Xiaoyan
    2015 2ND INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING AND INTERNET OF THINGS (DCIT), 2015, : 72 - 79
  • [33] Design and implementation of an automated network monitoring and reporting back system
    Khan, Rafiullah
    Khan, Sarmad Ullah
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2018, 9 : 24 - 34
  • [34] A DIGITAL SNAKE IMPLEMENTATION OF THE BACK-PROPAGATION NEURAL NETWORK
    PIAZZA, F
    MARCHESI, M
    ORLANDI, G
    1989 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-3, 1989, : 2185 - 2188
  • [35] Cognitiva - A Cognitive Industrial Wireless Network Protocol Protocol Design and Testbed Implementation
    Chiwewe, Tapiwa M.
    Hancke, Gerhard P.
    PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2016, : 2042 - 2047
  • [37] Securing ZRP Routing Protocol Against DDoS Attack in Mobile Ad Hoc Network
    Trivedi, Munesh C.
    Yadav, Sakshi
    Singh, Vikash Kumar
    ADVANCES IN DATA AND INFORMATION SCIENCES, ICDIS 2017, VOL 2, 2019, 39 : 387 - 396
  • [38] Implementation of IoT System for Securing Telecommunications Infrastructure Based on LoRaWAN Operator's Network
    Jovanovic, Marko Lj.
    Koprivica, Mladen
    Neskovic, Natasa
    PROCEEDINGS OF 18TH INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES (IEEE EUROCON 2019), 2019,
  • [39] Design and Implementation of Network Transfer Protocol for Big Genomic Data
    Aledhari, Mohammed
    Saeed, Fahad
    2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015, 2015, : 281 - 288
  • [40] Design and Implementation of a Centralized Routing Protocol for Wireless Sensor Network
    Cao, Xin
    Wang, Xiaoqin
    Lin, Xiao
    2016 10TH INTERNATIONAL CONFERENCE ON SENSING TECHNOLOGY (ICST), 2016,