A Case Study of Secure ATM Switch
نویسندگان
چکیده
This paper examines a few techniques for booting Asynchronous Transfer Mode (ATM) switches securely over an insecure network. Each of these techniques assume a diierent trust model. This work is being carried out in the context of the Fairisle ATM switch environment. In this environment we are envisaging an open multi-service network where ATM switches are booted with third party software, possibly using a third party booting service. Hence we are faced with an increased security threat, compared with a closed network environment, in ensuring that the switch has been booted with authorised and authenticated boot code. In this paper, we examines these threats and presents three schemes of countering the threats.
منابع مشابه
A Case Study of Secure ATM Switch Booting
This paper examines a few techniques in booting Asynchronous Transfer Mode (ATM) switches securely over an insecure network. Each of these techniques assume a diierent trust model. This work is carried out in the context of the Fairisle ATM switch environment. In this environment we are envisaging an open multi service network where ATM switches are booted with third party software, using a thi...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملATM Cell based Security Implementation
A secure network achieves integrity and privacy in communication by employing a shared private key for generation of a MAC and for payload encryption respec tively for its messages A public key cipher method is used for authentication and secret key exchange among remote nodes Lower layer security mechanisms cur rently available for ATM networks operate either at frame level or use a combined f...
متن کاملDCAN Approach to Open Switch Control 32 DCAN APPROACH TO OPEN SWITCH CONTROLFigure
This paper presents a novel approach to the control and management of ATM networks, by allowing diierent control architectures to be operational within the same network, and on the same switch. The resources available on an ATM switch are divided into switchlets, each of which encapsulates a subset of the physical ATM switch resources. A set of switchlets on diierent ATM switches combine to for...
متن کاملSwitchlets and Dynamic Virtual ATM Networks
This paper presents a novel approach to the control and management of ATM networks, by allowing di erent control architectures to be operational within the same network, and on the same switch. The resources available on an ATM switch are divided into switchlets, each of which encapsulates a subset of the physical ATM switch resources. A set of switchlets on di erent ATM switches combine to for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996