Formalization and information-theoretic soundness in the development of security architecture for next generation network protocol - UDT
- Publication Type:
- Conference Proceeding
- Citation:
- Communications in Computer and Information Science, 2011, 259 CCIS pp. 183 - 194
- Issue Date:
- 2011-12-01
Closed Access
Filename | Description | Size | |||
---|---|---|---|---|---|
2011001887OK.pdf | Published version | 229.68 kB |
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
The development and deployment of User Datagram Protocol (UDP)- based Data Transfer (UDT) is undoubtedly strongly reliant upon existing security mechanisms. However, existing mechanisms are developed for mature protocols such as TCP/UDP. We, therefore, developed proprietary mechanisms to form a security architecture for UDT. The primary objectives of the architecture include the management of messages through Authentication Option (AO) and cryptographic keys, the security of data communications, and the integration of data protection enhancing technologies across all the layers. Our approach is the result of our work which started in 2008. We verified each mechanism through formalisation to achieve information-theoretic soundness of the architecture. The results achieve the enhancement of existing schemes to introduce a novel approach to integrate mechanisms to secure UDT in its deployment. The architecture does include available and well-discussed schemes, which are used in other protocols, with proven computational intelligence which can be upgraded so as to provide improved security and primary protection in future extensive UDT deployments. In this work, we present UDT Security Architecture with suitable mechanisms to ensure preservation of data integrity in data transmission. © 2011 Springer-Verlag.
Please use this identifier to cite or link to this item: