Design Universal Security Scheme for Broadband Router
نویسندگان
چکیده
Taking account of defections existed in general methods of implementing IP security (IPsec) in broadband routers, a secure scheme based on fast path and slow path of routers was put forward. The scheme implements IPsec with Encryption chip and IPsec software combined, and adopts Encryption adaptive board to support multi-encryption chips. No requirement for change in original hardware architecture of broadband router makes the scheme universal. Wire-speed data forwarding and encryption are processed in fast path, while local data and protocol data which are non-real time tasks are processed in slow path, in which IPsec security policy (SP) and security association (SA) are also transferred. The scheme was tested in SR1880s, and testing results showed that the proposed scheme can satisfy the security needs of broadband router.
منابع مشابه
Defining the Benefit Package of Thailand Universal Coverage Scheme: From Pragmatism to Sophistication
Benefit package is crucial for implementing universal health coverage (UHC). This editorial analyses how the benefit package of the Thai Universal Coverage Scheme (UC Scheme) evolved from an implicit comprehensive package which covered all conditions and interventions (with a few exceptions), to additional explicit positive lists. In 2002 when the Thai UC Scheme was lau...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملA Suitable Coding Scheme for Broadband Power-line Communication
This paper introduces three coding strategies for using the Luby Transform (LT) code in a relay aided power-line communication scheme. In the first method, the relay decodes the received packets and re-encodes them for transmission towards the destination. In the second method, the relay only forwardes a random linear combination of its received packets towards the destination, while in the thi...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملTropos mesh architecture A reliable wireless IP broadband distribution area network
Tropos offers the market leading IP-based outdoor wireless broadband infrastructure that can be cost-effectively used for one or multiple applications. Designed to deliver superior capacity, resiliency, security and scalability, the Tropos mesh architecture is decentralized and highly flexible. Distributed intelligence enables each Tropos mesh router to make coordinated routing and airtime mana...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 10 شماره
صفحات -
تاریخ انتشار 2010