A Case Study of Secure ATM Switch Booting
نویسندگان
چکیده
This paper examines a few techniques in booting Asynchronous Transfer Mode (ATM) switches securely over an insecure network. Each of these techniques assume a diierent trust model. This work is carried out in the context of the Fairisle ATM switch environment. In this environment we are envisaging an open multi service network where ATM switches are booted with third party software, using a third party booting service. Hence we are faced with an increased security threat, compare with a closed network environment, in ensuring that the switch has been booted with authorised and authenticated boot code. In this paper, we examines these threats and presents three schemes of countering the threats.
منابع مشابه
A Case Study of Secure ATM Switch
This paper examines a few techniques for booting Asynchronous Transfer Mode (ATM) switches securely over an insecure network. Each of these techniques assume a diierent trust model. This work is being carried out in the context of the Fairisle ATM switch environment. In this environment we are envisaging an open multi-service network where ATM switches are booted with third party software, poss...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملATM Cell based Security Implementation
A secure network achieves integrity and privacy in communication by employing a shared private key for generation of a MAC and for payload encryption respec tively for its messages A public key cipher method is used for authentication and secret key exchange among remote nodes Lower layer security mechanisms cur rently available for ATM networks operate either at frame level or use a combined f...
متن کاملPersonal Firewalls and Intrusion Detection Systems
In this paper we explore how secure coprocessors can be used to secure client devices, especially mobile clients such as notebook computers. The goal is to protect data on the mobile client in case of theft, and to adapt the client's protection to the working environment --such as the Intranet or Internet-without relying completely on the integrity of the client. We show how physically secure c...
متن کاملDCAN Approach to Open Switch Control 32 DCAN APPROACH TO OPEN SWITCH CONTROLFigure
This paper presents a novel approach to the control and management of ATM networks, by allowing diierent control architectures to be operational within the same network, and on the same switch. The resources available on an ATM switch are divided into switchlets, each of which encapsulates a subset of the physical ATM switch resources. A set of switchlets on diierent ATM switches combine to for...
متن کامل