A Case Study of Secure ATM Switch Booting

نویسندگان

  • Shaw-Cheng Chuang
  • Michael Roe
چکیده

This paper examines a few techniques in booting Asynchronous Transfer Mode (ATM) switches securely over an insecure network. Each of these techniques assume a diierent trust model. This work is carried out in the context of the Fairisle ATM switch environment. In this environment we are envisaging an open multi service network where ATM switches are booted with third party software, using a third party booting service. Hence we are faced with an increased security threat, compare with a closed network environment, in ensuring that the switch has been booted with authorised and authenticated boot code. In this paper, we examines these threats and presents three schemes of countering the threats.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Case Study of Secure ATM Switch

This paper examines a few techniques for booting Asynchronous Transfer Mode (ATM) switches securely over an insecure network. Each of these techniques assume a diierent trust model. This work is being carried out in the context of the Fairisle ATM switch environment. In this environment we are envisaging an open multi-service network where ATM switches are booted with third party software, poss...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

ATM Cell based Security Implementation

A secure network achieves integrity and privacy in communication by employing a shared private key for generation of a MAC and for payload encryption respec tively for its messages A public key cipher method is used for authentication and secret key exchange among remote nodes Lower layer security mechanisms cur rently available for ATM networks operate either at frame level or use a combined f...

متن کامل

Personal Firewalls and Intrusion Detection Systems

In this paper we explore how secure coprocessors can be used to secure client devices, especially mobile clients such as notebook computers. The goal is to protect data on the mobile client in case of theft, and to adapt the client's protection to the working environment --such as the Intranet or Internet-without relying completely on the integrity of the client. We show how physically secure c...

متن کامل

DCAN Approach to Open Switch Control 32 DCAN APPROACH TO OPEN SWITCH CONTROLFigure

This paper presents a novel approach to the control and management of ATM networks, by allowing diierent control architectures to be operational within the same network, and on the same switch. The resources available on an ATM switch are divided into switchlets, each of which encapsulates a subset of the physical ATM switch resources. A set of switchlets on diierent ATM switches combine to for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996