ATM security reports

Source: Internet
Author: User

In order to complete the above Security Services, a relevant security message transmission mechanism is required. The change of the sending system adopted by the security service depends on whether the service is required during the connection establishment or during the connection life. When a connection is established, security packets can be exchanged through a signaling channel or a re-established data channel. During connection survival, OAM cells are used to carry secure packets.
Security message when connection is established
For connection establishment, there are two methods for sending messages safely. If both the signaling entity and network device in the end system support secure packet sending, the secure packets can be exchanged in the signaling channel. However, if these devices do not support secure packets, the end system and security proxy must send data on the new VCC/VPC after the connection is established, exchange security packets in the data channel.
Secure message for connection survival
Once the data connection is established, the security Packet Exchange mechanism requires password synchronization and session key updates. Because these packets are sensitive time related to the data traffic, they must be transmitted as additional data in the same VCC/VPC. In addition, it may be too late to synchronize the packets, thus breaking away from the synchronization decryption process.
The Security Working Group adopts the OAM cell that carries the relevant security information. Such OAM cells can be F4. they can be F4. they can also be f5. they can be quickly recognized by the Receiving Terminal System or security agent. In these two cases, the OAM cell type is "system management", and an appropriate "function type" is required to indicate security features ".
Summary
In addition to network infrastructure protection, ATM security also protects user information. ATM security is modeled after the Reference Model of the ATM Protocol. It is divided into three planes: User plane, control plane, and management plane. In the first phase, the special ATM security specifications mainly arrange user plane security services and limited control plane services.
The ATM user plane service specifies that the protection of user information is carried in a large number of ways in the virtual circuit. The Access Control Service emphasizes what can be used to access services and resources connected to an ATM. The authentication service ensures that both the caller and the called party receive real confirmation. The confidentiality service provides an encryption mechanism to protect the entire ATM connection from carrying authorized information. The integrity service ensures that user data values are not modified or the user data sequence is detected.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.