Security Functions in Telecommunications – Placement & Achievable Security

نویسندگان

  • Reiner Sailer
  • Hannes Federrath
  • Andreas Pfitzmann
چکیده

The placement of security functions determines which kinds of data they can protect against which kinds of attackers. Firstly, security functions are classified regarding their sphere of influence, e.g. between end points of communication associations (end-to-end) or end points of transmission lines (link-by-link). Next, we derive and illustrate restrictions and implications that limit the free choice concerning the placement of security functions. The general results are applied to interconnected telecommunication systems structured according to the OSI reference model. We investigate placement alternatives within user domains, network operators’ domains, and service providers’ domains and related implications on achievable security. We classify existing security solutions and describe the security that can be achieved by the respective solutions in order to promote the application of theoretical results. 1 Classification of security functions The functionality of telecommunication networks can be classified according to the placement of co-operating functions in specific components and layers. There are two basic degrees of freedom concerning the placement of functions within telecommunication networks (see also Fig. 1): ■ horizontal degree of freedom: choices for the placement of functions along different components ■ vertical degree of freedom: choices for the placement of functions along different layers of single components Security functions are functions that contribute to the security of a system, i.e. to the achievement of security goals. Voydock and Kent [8] differentiate between end-to-end (ete) and link-by-link (lbl) functionality and apply respective security functions as follows: lbl oriented security mechanisms offer security for information that is transmitted via an individual communication channel between two network nodes. The final source or destination of this information is not taken into account regarding lbl security. Ete oriented security functions consider the network as a medium for the exchange of protocol data units (PDUs) in a secure way between source and desti-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Presenting a New Method Based on Branch Placement for Optimal Placement of Phasor Measurement Units

In this paper, a new method based on branch placement for the optimal positioning of Phasor Measurement Units (PMUs) in power systems is proposed. In this method, the PMUs are in type of single-channel and are installed at the beginning of the branches. Therefore, they are able to measure the bus voltages. Also, the installation of the PMUs on the branches increases the security of observabilit...

متن کامل

Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach

In recent years, many security threats have entered into the organizations’ information and changed the  organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...

متن کامل

Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability

Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardwa...

متن کامل

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

Reliability and Supply Security based Method for Simultaneous Placement of Sectionalizer Switch and DER Units

This paper presents a new and useful methodology for simultaneous allocation of sectionalizer switches and distributed energy resources (DERs) considering both reliability and supply security aspects. The proposed algorithm defines the proper locations of sectionalizer switching devices in radial distribution networks considering the effect of DER units in the presented cost function and other ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999